WorldWideScience

Sample records for antineoplastic protocols

  1. A study protocol for the evaluation of occupational mutagenic/carcinogenic risks in subjects exposed to antineoplastic drugs: a multicentric project

    OpenAIRE

    Gelatti Umberto; Sabatini Laura; Dominici Luca; Appolloni Massimo; Buschini Annamaria; Carrieri Mariella; Ceretti Elisabetta; Barbieri Anna; Villarini Milena; Grollino Maria G; Mussi Francesca; Pavanello Sofia; Feretti Donatella; Bonfiglioli Roberta; Moretti Massimo

    2011-01-01

    Abstract Background Some industrial hygiene studies have assessed occupational exposure to antineoplastic drugs; other epidemiological investigations have detected various toxicological effects in exposure groups labeled with the job title. In no research has the same population been studied both environmentally and epidemiologically. The protocol of the epidemiological study presented here uses an integrated environmental and biological monitoring approach. The aim is to assess in hospital n...

  2. A study protocol for the evaluation of occupational mutagenic/carcinogenic risks in subjects exposed to antineoplastic drugs: a multicentric project

    Directory of Open Access Journals (Sweden)

    Gelatti Umberto

    2011-03-01

    Full Text Available Abstract Background Some industrial hygiene studies have assessed occupational exposure to antineoplastic drugs; other epidemiological investigations have detected various toxicological effects in exposure groups labeled with the job title. In no research has the same population been studied both environmentally and epidemiologically. The protocol of the epidemiological study presented here uses an integrated environmental and biological monitoring approach. The aim is to assess in hospital nurses preparing and/or administering therapy to cancer patients the current level of occupational exposure to antineoplastic drugs, DNA and chromosome damage as cancer predictive effects, and the association between the two. Methods/Design About 80 healthy non-smoking female nurses, who job it is to prepare or handle antineoplastic drugs, and a reference group of about 80 healthy non-smoking female nurses not occupationally exposed to chemicals will be examined simultaneously in a cross-sectional study. All the workers will be recruited from five hospitals in northern and central Italy after their informed consent has been obtained. Evaluation of surface contamination and dermal exposure to antineoplastic drugs will be assessed by determining cyclophosphamide on selected surfaces (wipes and on the exposed nurses' clothes (pads. The concentration of unmetabolized cyclophosphamide as a biomarker of internal dose will be measured in end-shift urine samples from exposed nurses. Biomarkers of effect and susceptibility will be assessed in exposed and unexposed nurses: urinary concentration of 8-hydroxy-2-deoxyguanosine; DNA damage detected using the single-cell microgel electrophoresis (comet assay in peripheral white blood cells; micronuclei and chromosome aberrations in peripheral blood lymphocytes. Genetic polymorphisms for enzymes involved in metabolic detoxification (i.e. glutathione S-transferases will also be analysed. Using standardized questionnaires

  3. Antineoplastic Drugs.

    Science.gov (United States)

    Morris, Sara; Michael, Nancy, Ed.

    This module on antineoplastic drugs is intended for use in inservice or continuing education programs for persons who administer medications in long-term care facilities. Instructor information, including teaching suggestions, and a listing of recommended audiovisual materials and their sources appear first. The module goal and objectives are then…

  4. Hospital surfaces contamination with antineoplastic drugs: influence of cleaning procedures

    OpenAIRE

    Oliveira, Ana Cebola; Pádua, Mário; Viegas, Susana

    2016-01-01

    Introduction: The raising frequency of cancer diseases is leading to a widespread application of antineoplastic drugs, thus increasing the probability of workplace surfaces contamination. Most of these drugs are classified by the International Agency for Research on Cancer as known or suspected human carcinogens. Skin absorption is the main route for antineoplastic drugs exposure in occupational settings, therefore cleaning protocols have paramount influence in surfaces contamination and, con...

  5. Antibacterial activities of antineoplastic agents.

    OpenAIRE

    Bodet, C A; Jorgensen, J H; Drutz, D J

    1985-01-01

    Fourteen antineoplastic agents were examined for in vitro antibacterial activity against 101 aerobic and anaerobic bacterial isolates representing indigenous human microflora and selected opportunistic pathogens. Only 5-fluorouracil, mitomycin, and etoposide demonstrated inhibitory effects at achievable plasma concentrations, while the remaining drugs lacked appreciable antibacterial activities.

  6. Handling of injectable antineoplastic agents.

    OpenAIRE

    Knowles, R S; Virden, J E

    1980-01-01

    Although the clinical toxicity of antineoplastic drugs has been well documented there is little or no information on the problems that may arise on the handling and mishandling of such agents. This paper attempts to highlight the importance of taking precautions to prevent adverse effects resulting from contact with cytotoxic drugs during handling and to suggest a practical guide for the handling of such agents.

  7. Hematological Changes in Nurses Handling Antineoplastic Drugs

    OpenAIRE

    Ansari-Lari, M; M.Saadat

    2002-01-01

    A cross-sectional study to determine whether occupational exposure to antineoplastic drugs can cause hematologic changes was performed. Blood samples were collected from a group of 24 hematology/oncology nurses who were exposed to antineoplastic drugs during a mean preiod of 5.5 years (standard error =1.1). The control group, matched by sex, and age, consisted of 18 nurses, worked on other sections. Within the normal range we found significant differences between the exposed and the control g...

  8. Hematological Changes in Nurses Handling Antineoplastic Drugs

    Directory of Open Access Journals (Sweden)

    M Ansari-Lari

    2002-08-01

    Full Text Available A cross-sectional study to determine whether occupational exposure to antineoplastic drugs can cause hematologic changes was performed. Blood samples were collected from a group of 24 hematology/oncology nurses who were exposed to antineoplastic drugs during a mean preiod of 5.5 years (standard error =1.1. The control group, matched by sex, and age, consisted of 18 nurses, worked on other sections. Within the normal range we found significant differences between the exposed and the control group in the absolute mean number of the total white blood cells (t=-2.50; df=40; P<0.05 and neutrophils (t=-1.72; df=40; P<0.05; one tailed test. The findings suggested, that the hematologic changes can serve as biological markers for medical surveillance and early detection of health problems due to handling antineoplastic drugs.

  9. Occupational rhinosinusitis due to etoposide, an antineoplastic agent

    DEFF Research Database (Denmark)

    Meyer, Harald W; Skov, Per Stahl

    2010-01-01

    This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent.......This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent....

  10. Antineoplastic drugs: Occupational exposure and health risks

    NARCIS (Netherlands)

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used.

  11. Tumor targeting using liposomal antineoplastic drugs

    OpenAIRE

    Jörg Huwyler; Jürgen Drewe; Stephan Krähenbühl

    2008-01-01

    Jörg Huwyler1, Jürgen Drewe2, Stephan Krähenbühl21University of Applied Sciences Northwestern Switzerland, Institute of Pharma Technology, Muttenz, Switzerland; 2Department of Research and Division of Clinical Pharmacology, University Hospital Basel, Basel, SwitzerlandAbstract: During the last years, liposomes (microparticulate phospholipid vesicles) have beenused with growing success as pharmaceutical carriers for antineoplastic drugs. Fields of applicatio...

  12. Antineoplastic drugs: Occupational exposure and health risks

    OpenAIRE

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used. Results of tests on bulk and surface contamination samples confirmed that patients intravenously treated with cyclophosphamide excrete the unmetabolized drug. The introduction of new guidelines and...

  13. Serine deprivation enhances antineoplastic activity of biguanides.

    Science.gov (United States)

    Gravel, Simon-Pierre; Hulea, Laura; Toban, Nader; Birman, Elena; Blouin, Marie-José; Zakikhani, Mahvash; Zhao, Yunhua; Topisirovic, Ivan; St-Pierre, Julie; Pollak, Michael

    2014-12-15

    Metformin, a biguanide widely used in the treatment of type II diabetes, clearly exhibits antineoplastic activity in experimental models and has been reported to reduce cancer incidence in diabetics. There are ongoing clinical trials to evaluate its antitumor properties, which may relate to its fundamental activity as an inhibitor of oxidative phosphorylation. Here, we show that serine withdrawal increases the antineoplastic effects of phenformin (a potent biguanide structurally related to metformin). Serine synthesis was not inhibited by biguanides. Instead, metabolic studies indicated a requirement for serine to allow cells to compensate for biguanide-induced decrease in oxidative phosphorylation by upregulating glycolysis. Furthermore, serine deprivation modified the impact of metformin on the relative abundance of metabolites within the citric acid cycle. In mice, a serine-deficient diet reduced serine levels in tumors and significantly enhanced the tumor growth-inhibitory actions of biguanide treatment. Our results define a dietary manipulation that can enhance the efficacy of biguanides as antineoplastic agents that target cancer cell energy metabolism. PMID:25377470

  14. 75 FR 57044 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2010

    Science.gov (United States)

    2010-09-17

    ... HUMAN SERVICES Centers for Disease Control and Prevention NIOSH List of Antineoplastic and Other... following document entitled ``NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings... Alert: Preventing Occupational Exposures to Antineoplastic and Other Hazardous Drugs in Health...

  15. Nurses with dermal exposure to antineoplastic drugs: Reproductive outcomes

    NARCIS (Netherlands)

    Fransman, W.; Roeleveld, N.; Peelen, S.; Kort, W.de; Kromhout, H.; Heederik, D.

    2007-01-01

    BACKGROUND: Nurses and other hospital workers are exposed to antineoplastic drugs during daily activities. Previous studies suggest that antineoplastic drugs at occupational exposure levels may be toxic to reproduction, but these studies are not consistent or conclusive. METHODS: Self-administered q

  16. Nurses with dermal exposure to antineoplastic drugs: reproductive outcomes.

    NARCIS (Netherlands)

    Fransman, W.; Roeleveld, N.; Peelen, S.J.M.; Kort, W. de; Kromhout, H.; Heederik, D.

    2007-01-01

    BACKGROUND: Nurses and other hospital workers are exposed to antineoplastic drugs during daily activities. Previous studies suggest that antineoplastic drugs at occupational exposure levels may be toxic to reproduction, but these studies are not consistent or conclusive. METHODS: Self-administered q

  17. Tumor targeting using liposomal antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Jörg Huwyler

    2008-03-01

    Full Text Available Jörg Huwyler1, Jürgen Drewe2, Stephan Krähenbühl21University of Applied Sciences Northwestern Switzerland, Institute of Pharma Technology, Muttenz, Switzerland; 2Department of Research and Division of Clinical Pharmacology, University Hospital Basel, Basel, SwitzerlandAbstract: During the last years, liposomes (microparticulate phospholipid vesicles have beenused with growing success as pharmaceutical carriers for antineoplastic drugs. Fields of application include lipid-based formulations to enhance the solubility of poorly soluble antitumordrugs, the use of pegylated liposomes for passive targeting of solid tumors as well as vector-conjugated liposomal carriers for active targeting of tumor tissue. Such formulation and drug targeting strategies enhance the effectiveness of anticancer chemotherapy and reduce at the same time the risk of toxic side-effects. The present article reviews the principles of different liposomal technologies and discusses current trends in this field of research.Keywords: tumor targeting, antineoplastic drugs, liposomes, pegylation, steric stabilization, immunoliposomes

  18. Liposomes as delivery systems for antineoplastic drugs

    Science.gov (United States)

    Medina, Luis Alberto

    2014-11-01

    Liposome drug formulations are defined as pharmaceutical products containing active drug substances encapsulated within the lipid bilayer or in the interior aqueous space of the liposomes. The main importance of this drug delivery system is based on its drastic reduction in systemic dose and concomitant systemic toxicity that in comparison with the free drug, results in an improvement of patient compliance and in a more effective treatment. There are several therapeutic drugs that are potential candidates to be encapsulated into liposomes; particular interest has been focused in therapeutic and antineoplastic drugs, which are characterized for its low therapeutic index and high systemic toxicity. The use of liposomes as drug carriers has been extensively justified and the importance of the development of different formulations or techniques to encapsulate therapeutic drugs has an enormous value in benefit of patients affected by neoplastic diseases.

  19. Antineoplastic Effects of Honey Bee Venom

    Directory of Open Access Journals (Sweden)

    Mohammad Nabiuni

    2013-08-01

    Full Text Available Background: Bee venom (BV, like many other complementary medicines, has been used for thousands of years for the treatment of a range of diseases. More recently, BV is also being considered as an effective composition for the treatment of cancer. Cancer is a major worldwide problem. It is obvious that the identification of compounds that can activate apoptosis could be effective on the treatment of cancer. BV is a very complicated mixture of active peptides, enzymes, and biologically active amines. The two main components of BV are melittin and phospholipase A2 (PLA2. Of these two components, melittin, the major active ingredient of BV, has been identified to induce apoptosis and to possess anti-tumor effects. We tried to review antineoplastic effects of BV in this study. Materials and Methods: The related articles were derived from different data bases such as PubMed, Elsevier Science, and Google Scholar using keywords including bee venom, cancer, and apoptosis.Results: According to the results of this study, BV can induce apoptosis and inhibit tumor cell growth and metastasis. Results of in vivo experiments show that the anti-tumor effect of the BV is highly dependent on the manner of injection as well as the distance between the area of injection and the tumor cells.Conclusion: The results obtained from the reported studies revealed that BV has anti-cancer effects and can be used as an effective chemotherapeutic agent against tumors in the future.

  20. Approval of antineoplastic agents in India: comparison with the US and EU regions

    OpenAIRE

    Bhaven C. Kataria; Dimple S. Mehta; Sunita B Chhaiya

    2012-01-01

    Background: The antineoplastic drugs are prescribed for the treatment of cancer, which is an important cause of mortality in India; therefore, a drug lag in the availability of antineoplastic drugs is a direct threat to life. The present study was undertaken to assess the drug lag for new antineoplastic agents in India compared with that in the United States (US) or European Union (EU). Methods: The new antineoplastic agents approved in the United States, European Union and India between 1999...

  1. 77 FR 38297 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-06-27

    ... Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012 AGENCY: National Institute for Occupational... Prevention (CDC) announces the publication of the following document entitled ``NIOSH List of Antineoplastic... Preventing Occupational Exposures to Antineoplastic and Other Hazardous Drugs in Health Care Settings...

  2. Experimental study on anti-neoplastic activity of epigallocatechin-3-gallate to digestive tract carcinomas

    Institute of Scientific and Technical Information of China (English)

    RAN Zhi-hua; ZOU Jian; XIAO Shu-dong

    2005-01-01

    Background Epigallocatechin-3-gallate (EGCG) has been demonstrated to have anti-neoplastic activity, but the effective concentration of EGCG and its possible mechanisms are uncertain. The study on the killing effects of EGCG on different digestive tract cancer cell lines can find target sites of its anti-neoplastic effect and provide a theoretical basis for its clinical application in the treatment of cancers. Methods Methyl thiazolyl tetrazolium (MTT) analysis was made to detect the differential sensitivities of eight digestive tract cancer cell lines to EGCG. The effect of EGCG on cell cycle distribution of sensitive cancer cell line was measured by flow cytometry. By polymerase chain reaction (PCR)-enzyme linked immunosorbent assay (ELISA) protocol, the influence of EGCG on telomerase activity of sensitive cancer cell line was also investigated. RT-PCR method was employed to detect the influence of EGCG on the expressions of hTERT, c-myc, p53 and mad1 genes in sensitive cancer cell line. Results EGCG exhibited dose-dependent killing effects on all eight disgestive tract cancer cell lines. The 50% inhibitory concentration (IC50) of SW1116, MKN45, BGC823, SGC7901, AGS, MKN28, HGC27 and LoVo cells were 51.7 μmol/L, 55.9 μmol/L, 68.5 μmol/L, 79.1 μmol/L, 83.8 μmol/L, 119.8 μmol/L, 183.2 μmol/L and 194.6 μmol/L, respectively. There were no apparent changes in cell cycle distribution of sensitive cancer cell line MKN45 48 hours after incubating with three different concentrations of EGCG compared with the controls. It was found that EGCG could suppress the telomerase activity of MKN45 cells, and the effects were dose- and time-dependent. After EGCG administration, the expression of hTERT and c-myc genes in MKN45 cells was decreased, that of the mad1 gene increased, and that of the p53 gene unchanged. Conclusions EGCG has dose-dependent killing effects on different digestive tract cancer cell lines. Administration of EGCG has no obvious effect on cell cycle

  3. Genotoxic assessment in different exposure groups working with antineoplastic agents

    OpenAIRE

    Ladeira, Carina; Viegas, Susana; Pádua, Mário; Carolino, Elisabete; Gomes, Manuel C.; Brito, Miguel

    2015-01-01

    Antioneoplastic drugs are widely used in treatment of cancer, and several studies suggest acute and long-term effects associated to antineoplastic drug exposures, namely associating workplace exposure with health effects. Cytokinesis blocked micronucleus (CBMN) assay is one promising short-term genotoxicity assays for human risk assessment and their combination is recommended to monitor populations chronically exposed to genotoxic agents. The aim of this investigation is the genotoxicity asse...

  4. The Effect of Genetic Polymorphism upon Antineoplastic Sensitivity

    Institute of Scientific and Technical Information of China (English)

    Jun Liang

    2006-01-01

    In clinical practice, patients undergoing chemotherapy display prominent individual differences, adverse reactions and sensitivity to antineoplastic therapy. Those differences are caused by individual genetic polymorphism of related genes. Genetic variation can induce distinct alterations of drug-metabolizing enzymes, drug transporters, drug targets and DNA repair enzymes and thereby influence the ability of the drugs to reach their target sites. This article reviews in detail the potential interactions mentioned above.

  5. Drug Interaction in Psycho-Oncology: Antidepressants and Antineoplastics

    OpenAIRE

    de Miguel, C; E. Albuquerque

    2011-01-01

    Background and Objectives: Although there is a growing impact of psychiatric and depressive disorders in cancer patients, literature on the idiosyncrasies of antidepressants (ADs) used in those conditions and their interactions with antineoplastic agents (ANs) is scarce. Sharing the same biotransformation pathways enhances the risk of drug interaction between ADs and ANs, specifically when compounds are inducers, inhibitors or substrates of cytochrome P450 (CYP 450). In cancer patients, such ...

  6. Oral Antineoplastic Agents: Assessing the Delay in Care

    Directory of Open Access Journals (Sweden)

    Brandi Anders

    2015-01-01

    Full Text Available The study was undertaken to determine the length of time between when a prescription for an oral antineoplastic agent is written by the provider and when the medication is received by the patient and to identify risk factors that significantly increase time to medication receipt. First-time fill prescriptions for oral antineoplastic agents were identified. The date the prescription was written and received by the patient was determined. A retrospective review was completed to gather additional information, including prescribed medication, indication, insurance coverage, patient assistance program use, dispensing pharmacy, and prior authorization requirements. The data was analyzed through multivariate statistical analysis and used to identify risk factors that may significantly increase the time to medication receipt. A total of 58 patients were included in the study. A median of 8 days elapsed between when the medication was prescribed and when it was received by the patient. Medication prescribed, absence of a Risk Evaluation Mitigation Strategies (REMS program, and insurance type are factors that increased time to medication receipt. An understanding of the median time involved, as well as factors affecting the time to delivery of prescriptions, will help healthcare providers better plan and prepare for the use of oral antineoplastic agents.

  7. Potential antineoplastic effects of Aloe-emodin: a comprehensive review.

    Science.gov (United States)

    Chen, Ruie; Zhang, Jinming; Hu, Yangyang; Wang, Shengpeng; Chen, Meiwan; Wang, Yitao

    2014-01-01

    Aloe-emodin (AE), a bioactive anthraquinone derived from both Aloe vera and Rheum officinale, has recently been demonstrated to have various pharmacological activities. With the widespread popularity of natural products, such as antineoplastic drugs, AE has attracted much attention due to its remarkable antineoplastic activity on multiple tumor cells involving multi-channel mechanisms, including the disruption of cell cycle, induction of apoptosis, anti-metastasis, antiangiogenic, and strengthening of immune function. Experimental data have revealed AE as a potentially potent anti-cancer candidate. Despite this, the pharmaceutical application of AE is still in a fledging period as most research has concentrated on the elucidation of the molecular mechanism of action of existing treatments, rather than the development of novel formulations. Therefore, the present review summarizes the potential toxicity, molecular mechanism, pharmacokinetic characteristics, and pharmaceutical development of AE as an antineoplastic agent. This is based on its physicochemical properties, in an attempt to encourage further research on AE as a potential anti-cancer agent. PMID:24707862

  8. Monitoring method for surface contamination caused by selected antineoplastic agents.

    Science.gov (United States)

    Larson, R R; Khazaeli, M B; Dillon, H Kenneth

    2002-02-01

    A method of evaluating surface contamination caused by selected antineoplastic agents was studied. The antineoplastic agents tested were cyclophosphamide, ifosfamide, doxorubicin hydrochloride, fluorouracil, and paclitaxel. Each agent was reconstituted and prepared as a stock solution. A 0.1-mL portion of each solution was spread evenly over a 600-cm2 area of a stainless steel surface, a resin countertop surface, and a vinyl flooring surface. After drying, the surfaces were wiped with each of two types of commercially available wiping materials (What-man no. 42 filters and Kimberly-Clark Kimwipes). A blend of methanol, acetonitrile, and buffered water was used both as the wetting agent for wiping the surfaces and as a desorbing solution. The desorbate was analyzed for drug concentration by reverse-phase high-performance liquid chromatography (HPLC). Mean +/- S.D. percent total recovery ranged from 72.4% +/- 17.6% to 95.3% +/- 2.9% for the vinyl surface wiped with filters, 91.5% +/- 5.4% to 104.7% +/- 0.8% for the resin surface wiped with filters, 73.9% +/- 2.3% to 95.3% +/- 1.7% for the stainless steel surface wiped with filters, and 18.2% +/- 1.4% to 372.8% +/- 8.0% for the stainless steel surface wiped with Kimwipes. Results were best for ifosfamide and cyclophosphamide. Kimwipes were deemed ineffective for this monitoring method because an ingredient interfered with the quantitative analytical tests. A wipe-sampling, desorption, and HPLC method for monitoring surface contamination by selected antineoplastic agents was sufficiently accurate and sensitive to evaluate surfaces typically found in both the pharmacy and drug administration areas of oncology treatment facilities. PMID:11862639

  9. A pooled analysis to study trends in exposure to antineoplastic drugs among nurses.

    NARCIS (Netherlands)

    Fransman, W.; Peelen, S.J.M.; Hilhorst, S.; Roeleveld, N.; Heederik, D.; Kromhout, H.

    2007-01-01

    OBJECTIVES: Several studies have shown that exposure to antineoplastic drugs can cause toxic effects on reproductive health as well as carcinogenic effects. Numerous studies have corroborated that hospital workers are exposed to these drugs. This study focused on trends in exposure to antineoplastic

  10. 78 FR 33097 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2014: Proposed...

    Science.gov (United States)

    2013-06-03

    ... HUMAN SERVICES Centers for Disease Control and Prevention NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2014: Proposed Additions and Deletions to the NIOSH Hazardous Drug... following draft document for public comment entitled ``NIOSH List of Antineoplastic and Other...

  11. 76 FR 46299 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012: Proposed...

    Science.gov (United States)

    2011-08-02

    ... HUMAN SERVICES Centers for Disease Control and Prevention NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012: Proposed Additions and Deletions to the NIOSH Hazardous Drug... following draft document for public comment entitled ``NIOSH List of Antineoplastic and Other...

  12. Misonidazole pretreatment enhances the cytotoxicity of antineoplastic agents

    International Nuclear Information System (INIS)

    Over the years, a substantial effort has been devoted to developing methods to overcome the problem of hypoxic cells in radiotherapy, the most recent of which involves the use of heterocyclic nitro compounds that mimic oxygen and interact with radiation to increase specifically the sensitivity of hypoxic cells, while not affecting the response of normal aerated cells. A number of compounds have been identified and studied in experimental systems and one of them, Misonidazole, preferentially cytotoxic to cells deficient in oxygen. The suggestion that the toxicity shown towards hypoxic cells by electron affinic agents might be valuable in combination with antineoplastic agents was based on the premise that they would act in a way that was complementary, but independent, i.e., that the hypoxic mediated drugs would kill the hypoxic cells spared by the conventional chemotherapy agents. There is now good evidence, however, of a direct interaction between electron affinic compounds and other antineoplastic agents. The present investigation extends the range of chemotherapy agents shown to interact with Misonidazole to include Bleomycin, and in particular addresses the question of the mechanism of the interaction

  13. Approval of antineoplastic agents in India: comparison with the US and EU regions

    Directory of Open Access Journals (Sweden)

    Bhaven C. Kataria

    2012-02-01

    Full Text Available Background: The antineoplastic drugs are prescribed for the treatment of cancer, which is an important cause of mortality in India; therefore, a drug lag in the availability of antineoplastic drugs is a direct threat to life. The present study was undertaken to assess the drug lag for new antineoplastic agents in India compared with that in the United States (US or European Union (EU. Methods: The new antineoplastic agents approved in the United States, European Union and India between 1999 and 2011 were identified and information was gathered primarily from the websites of regulatory agencies of the three regions. We assessed absolute and relative drug lag for new antineoplastic agents approved in the three regions. Results: Of the 70 new antineoplastic agents, 64 (91.42% were approved in the United States, 54 (77.14% in the European Union and 44 (62.85% in India. The US was the first to approve 59 (84.28% out of the 70 new antineoplastic agents, the EU was the first to approve 9 (12.85% and India was the first to approve 2 (2.85%. The median approval lag for India (26.35 months was higher as compared to the United States (0 month and European Union (7.3 months. Conclusions: This study confirms that India's drug lag in the case of new antineoplastic agents is higher as compared to the US and EU. Further detailed analyses are necessary to find the reasons and impacts of drug lag for antineoplastic agents in India. [Int J Basic Clin Pharmacol 2012; 1(1.000: 13-21

  14. Stereocomplex micelle from nonlinear enantiomeric copolymers efficiently transports antineoplastic drug

    Science.gov (United States)

    Wang, Jixue; Shen, Kexin; Xu, Weiguo; Ding, Jianxun; Wang, Xiaoqing; Liu, Tongjun; Wang, Chunxi; Chen, Xuesi

    2015-05-01

    Nanoscale polymeric micelles have attracted more and more attention as a promising nanocarrier for controlled delivery of antineoplastic drugs. Herein, the doxorubicin (DOX)-loaded poly(D-lactide)-based micelle (PDM/DOX), poly(L-lactide)-based micelle (PLM/DOX), and stereocomplex micelle (SCM/DOX) from the equimolar mixture of the enantiomeric four-armed poly(ethylene glycol)-polylactide (PEG-PLA) copolymers were successfully fabricated. In phosphate-buffered saline (PBS) at pH 7.4, SCM/DOX exhibited the smallest hydrodynamic diameter ( D h) of 90 ± 4.2 nm and the slowest DOX release compared with PDM/DOX and PLM/DOX. Moreover, PDM/DOX, PLM/DOX, and SCM/DOX exhibited almost stable D hs of around 115, 105, and 90 nm at above normal physiological condition, respectively, which endowed them with great potential in controlled drug delivery. The intracellular DOX fluorescence intensity after the incubation with the laden micelles was different degrees weaker than that incubated with free DOX · HCl within 12 h, probably due to the slow DOX release from micelles. As the incubation time reached to 24 h, all the cells incubated with the laden micelles, especially SCM/DOX, demonstrated a stronger intracellular DOX fluorescence intensity than free DOX · HCl-cultured ones. More importantly, all the DOX-loaded micelles, especially SCM/DOX, exhibited potent antineoplastic efficacy in vitro, excellent serum albumin-tolerance stability, and satisfactory hemocompatibility. These encouraging data indicated that the loading micelles from nonlinear enantiomeric copolymers, especially SCM/DOX, might be promising in clinical systemic chemotherapy through intravenous injection.

  15. "Sister Chromatid Exchanges and Micronuclei in Lymphocyte of Nurses Handling Antineoplastic Drugs"

    Directory of Open Access Journals (Sweden)

    M Ansari-Lari

    2001-07-01

    Full Text Available Individuals handling antineoplastic drugs or their wastes may absorb these potent genotoxic agents. The effects of handling antineoplastic drugs were examined in a group of 24 nurses working in the hematology and oncology departments of two different university hospitals in Shiraz (Iran and in a group of 18 unexposed nurses as control group. The cytogenetic repercussions of exposure were assessed by examining sister chromatid exchanges (SCEs and micronuclei (Mn in circulating lymphocytes. A significant increased frequencies of SCE and Mn is observed in circulating lymphocytes. A significant increased frequencies of SCE and Mn is observed in nurses in daily contact with antineoplastic drugs as compared to control group.

  16. List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012

    Science.gov (United States)

    ... 68:16.04 Estrogens Not in AHFS (nonsteroidal synthetic estrogen) 76:00 Oxytocics 10:00 Antineoplastic agents ... Raltitrexed Ribavirin Streptozocin Tacrolimus Tamoxifen Temozolomide Teniposide Testolactone Testosterone Thalidomide Thioguanine Thiotepa Topotecan Toremifene citrate Tositumomab Tretinoin ...

  17. 77 FR 41190 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-07-12

    ... in the Federal Register June 27, 2012, (77 FR 38297). This notice is corrected as follows: On page... Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012, Correction AGENCY: National Institute...

  18. The Drug Sensitivity of Cyclosporine A Combined with Antineoplastic Drugs in Retinoblastoma in Vitro

    Institute of Scientific and Technical Information of China (English)

    Wanli Liu; Zhongyao Wu

    2005-01-01

    Purpose: To study cyclosporine A inhibition on the fresh retinoblastoma cells in vitro and increasing the drug sensitivity after combined with different antineoplastic drugs.Methods: To study the growth curve of cyclosporine A on 27 samples of primary retinoblastoma cells by MTT assay and to study the change of the drug sensitivity by cyclosporine A combined with seven antineoplastic drugs.Results: The average IC50 of cyclosporine A on the 27 retinoblastoma cells is 67.81μg/ml and the average inhibitive rate of these samples is 26.1% when cyclosporine A is in the concentration of 2μg/ml. The inhibitive rates all got improved after the seven antineoplastic drugs combined with cyclosporine A and the increasing average inhibitive rate is more than 5.Conclusion: Cyclosporine A can inhibit retinoblastoma cells in vitro and its inhibitive effect is dose dependent. Moreover it can enhance the inhibition of multiple antineoplastic drugs on retinoblastoma cells.

  19. 392 Lung Toxicity Induced by Novel Antineoplastic Therapies in Cancer Patients

    OpenAIRE

    Syrigos, Kostas N.; Vassos, Dimitrios; Makrilia, Nektaria; Tsimpoukis, Sotirios; Politi, Ekaterini; Dannos, Ioannis; Syrigou, Ekaterini

    2012-01-01

    Background Pulmonary toxicity and respiratory failure are major adverse events complicating the use of novel antineoplastic agents in the treatment of lung cancer. We aim to investigate the risk and characteristics of cytostatic-induced pulmonary toxicity caused by agents currently used to treat lung cancer. Methods A literature search was performed in PubMed to identify relative studies published until June 2011. Results Almost all categories of antineoplastic agents have been associated wit...

  20. Berberine and Coptidis Rhizoma as novel antineoplastic agents: A review of traditional use and biomedical investigations

    OpenAIRE

    Feng, Y.; Tsao, S; Tang, J; Wang, N.; Curtain, R; Wang, Y.

    2009-01-01

    Ethnopharmacological relevance: Coptidis Rhizoma (Huanglian) and its major component, berberine, have drawn extensive attention toward their antineoplastic effects in the recent years. The antineoplastic effects are related to the Chinese Medicine (CM) properties of Huangliang in treating diseases by removing damp-heat and purging fire and counteracting toxicity. Aim of the review: To trace the long history of the traditional use of Huanglian from folk medicines, especially from Chinese medic...

  1. Redox-directed cancer therapeutics: Taurolidine and Piperlongumine as broadly effective antineoplastic agents (Review)

    OpenAIRE

    MÖHLER, HANS; PFIRMAN, ROLF W.; Frei, Karl

    2014-01-01

    Targeting the oxygen stress response pathway is considered a promising strategy to exert antineoplastic activity in a broad spectrum of tumor types. Supporting this view, we summarize the mechanism of action of Taurolidine and Piperlongumine, two antineoplastic agents with strikingly broad tumor selectivity. Taurolidine enhances the oxidative stress (ROS) selectively in tumor cells. Its cytotoxicity for various tumor cells in vitro and in vivo, which includes tumor stem cells, is based on the...

  2. Interactive effects of antifungal and antineoplastic agents on yeasts commonly prevalent in cancer patients.

    OpenAIRE

    Ghannoum, M. A.; Motawy, M S; Abu Hatab, M A; Abu Elteen, K H; Criddle, R. S.

    1989-01-01

    The effects of combinations of antifungal and antineoplastic drugs on inhibition of the growth of yeasts which commonly infect cancer patients have been analyzed. It was shown that (i) inhibitory drug combinations could be selected in which all drugs were at levels far below their individual MICs; (ii) interactive effects among antineoplastic and antifungal drugs may be very large; (iii) optimum combinations of drugs for inhibition of yeast growth depended upon both the relative and absolute ...

  3. "Sister Chromatid Exchanges and Micronuclei in Lymphocyte of Nurses Handling Antineoplastic Drugs"

    OpenAIRE

    Ansari-Lari, M; M.Saadat; Shahryari, M.; DD Farhud

    2001-01-01

    Individuals handling antineoplastic drugs or their wastes may absorb these potent genotoxic agents. The effects of handling antineoplastic drugs were examined in a group of 24 nurses working in the hematology and oncology departments of two different university hospitals in Shiraz (Iran) and in a group of 18 unexposed nurses as control group. The cytogenetic repercussions of exposure were assessed by examining sister chromatid exchanges (SCEs) and micronuclei (Mn) in circulating lymphocytes. ...

  4. Side effects of antineoplastic and immunomodulating medications reported by European consumers

    OpenAIRE

    Aagaard, Lise; Hansen, Ebba Holme

    2013-01-01

    Objective: To characterize adverse drug reactions (ADRs) reported by European (EU) consumer for antineoplastic and immunomodulating medications. Methods: ADRs reported by consumers of antineoplastic and immunomodulating medications (anatomical therapeutic chemical [ATC]) group L from 2007 to 2011 and located in the EU ADR database, EudraVigilance, were analyzed. Data were categorized with respect to age and sex, category, and seriousness of reported ADRs and medications. The unit of analysis ...

  5. Evidence for tankyrases as antineoplastic targets in lung cancer

    International Nuclear Information System (INIS)

    New pharmacologic targets are urgently needed to treat or prevent lung cancer, the most common cause of cancer death for men and women. This study identified one such target. This is the canonical Wnt signaling pathway, which is deregulated in cancers, including those lacking adenomatous polyposis coli or β-catenin mutations. Two poly-ADP-ribose polymerase (PARP) enzymes regulate canonical Wnt activity: tankyrase (TNKS) 1 and TNKS2. These enzymes poly-ADP-ribosylate (PARsylate) and destabilize axin, a key component of the β-catenin phosphorylation complex. This study used comprehensive gene profiles to uncover deregulation of the Wnt pathway in murine transgenic and human lung cancers, relative to normal lung. Antineoplastic consequences of genetic and pharmacologic targeting of TNKS in murine and human lung cancer cell lines were explored, and validated in vivo in mice by implantation of murine transgenic lung cancer cells engineered with reduced TNKS expression relative to controls. Microarray analyses comparing Wnt pathway members in malignant versus normal tissues of a murine transgenic cyclin E lung cancer model revealed deregulation of Wnt pathway components, including TNKS1 and TNKS2. Real-time PCR assays independently confirmed these results in paired normal-malignant murine and human lung tissues. Individual treatments of a panel of human and murine lung cancer cell lines with the TNKS inhibitors XAV939 and IWR-1 dose-dependently repressed cell growth and increased cellular axin 1 and tankyrase levels. These inhibitors also repressed expression of a Wnt-responsive luciferase construct, implicating the Wnt pathway in conferring these antineoplastic effects. Individual or combined knockdown of TNKS1 and TNKS2 with siRNAs or shRNAs reduced lung cancer cell growth, stabilized axin, and repressed tumor formation in murine xenograft and syngeneic lung cancer models. Findings reported here uncovered deregulation of specific components of the Wnt pathway in both

  6. Dental anomalies in children submitted to antineoplastic therapy

    Directory of Open Access Journals (Sweden)

    Camila Merida Carrillo

    2014-06-01

    Full Text Available Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  7. Unexploited Antineoplastic Effects of Commercially Available Anti-Diabetic Drugs

    Directory of Open Access Journals (Sweden)

    Panagiota Papanagnou

    2016-05-01

    Full Text Available The development of efficacious antitumor compounds with minimal toxicity is a hot research topic. Numerous cancer cell targeted agents are evaluated daily in laboratories for their antitumorigenicity at the pre-clinical level, but the process of their introduction into the market is costly and time-consuming. More importantly, even if these new antitumor agents manage to gain approval, clinicians have no former experience with them. Accruing evidence supports the idea that several medications already used to treat pathologies other than cancer display pleiotropic effects, exhibiting multi-level anti-cancer activity and chemosensitizing properties. This review aims to present the anticancer properties of marketed drugs (i.e., metformin and pioglitazone used for the management of diabetes mellitus (DM type II. Mode of action, pre-clinical in vitro and in vivo or clinical data as well as clinical applicability are discussed here. Given the precious multi-year clinical experience with these non-antineoplastic drugs their repurposing in oncology is a challenging alternative that would aid towards the development of therapeutic schemes with less toxicity than those of conventional chemotherapeutic agents. More importantly, harnessing the antitumor function of these agents would save precious time from bench to bedside to aid the fight in the arena of cancer.

  8. Antineoplastic effects of mammalian target of rapamycine inhibitors.

    Science.gov (United States)

    Salvadori, Maurizio

    2012-10-24

    Cancer after transplantation is the third cause of death and one of the more relevant comorbidities. Aim of this review is to verify the role of different pathogenetic mechanisms in cancer development in transplant patients and in general population as well. In particular has been outlined the different role exerted by two different families of drug as calcineurin inhibitor and mammalian target of rapamycin (mTOR) inhibitor. The role of mTOR pathways in cell homeostasis is complex but enough clear. As a consequence the mTOR pathway deregulation is involved in the genesis of several cancers. Hence the relevant role of mTOR inhibitors. The authors review the complex mechanism of action of mTOR inhibitors, not only for what concerns the immune system but also other cells as endothelial, smooth muscle and epithelial cells. The mechanism of action is still now not completely defined and understood. It implies the inhibition of mTOR pathway at different levels, but mainly at level of the phosphorylation of several intracellular kinases that contribute to activate mTOR complex. Many prospective and retrospective studies in transplant patients document the antineoplastic role of mTOR inhibition. More recently mTOR inhibitors proven to be effective in the treatment of some cancers also in general population. Kidney cancers, neuroendocrine tumors and liver cancers seem to be the most sensitive to these drugs. Best results are obtained with a combination treatment, targeting the mTOR pathway at different levels. PMID:24175199

  9. Unexploited Antineoplastic Effects of Commercially Available Anti-Diabetic Drugs

    Science.gov (United States)

    Papanagnou, Panagiota; Stivarou, Theodora; Tsironi, Maria

    2016-01-01

    The development of efficacious antitumor compounds with minimal toxicity is a hot research topic. Numerous cancer cell targeted agents are evaluated daily in laboratories for their antitumorigenicity at the pre-clinical level, but the process of their introduction into the market is costly and time-consuming. More importantly, even if these new antitumor agents manage to gain approval, clinicians have no former experience with them. Accruing evidence supports the idea that several medications already used to treat pathologies other than cancer display pleiotropic effects, exhibiting multi-level anti-cancer activity and chemosensitizing properties. This review aims to present the anticancer properties of marketed drugs (i.e., metformin and pioglitazone) used for the management of diabetes mellitus (DM) type II. Mode of action, pre-clinical in vitro and in vivo or clinical data as well as clinical applicability are discussed here. Given the precious multi-year clinical experience with these non-antineoplastic drugs their repurposing in oncology is a challenging alternative that would aid towards the development of therapeutic schemes with less toxicity than those of conventional chemotherapeutic agents. More importantly, harnessing the antitumor function of these agents would save precious time from bench to bedside to aid the fight in the arena of cancer. PMID:27164115

  10. Antineoplastic Effect of Decoy Oligonucleotide Derived from MGMT Enhancer

    Science.gov (United States)

    Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy. PMID:25460932

  11. Antineoplastic effect of decoy oligonucleotide derived from MGMT enhancer.

    Directory of Open Access Journals (Sweden)

    Tamar Canello

    Full Text Available Silencing of O(6-methylguanine-DNA-methyltransferase (MGMT in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1 within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN. Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy.

  12. Taurolidine: cytotoxic and mechanistic evaluation of a novel antineoplastic agent.

    Science.gov (United States)

    Calabresi, P; Goulette, F A; Darnowski, J W

    2001-09-15

    Bis-(1,1-dioxoperhydro-1,2,4-thiadiazinyl-4)methane (taurolidine) is a synthetic broad-spectrum antibiotic that reacts with bacterial cell membrane components to prevent adhesion to epithelial cell surfaces. Reflecting the key role of adhesion in the growth and development of human solid tumors, studies were initiated to assess the antiproliferative activity of this agent in selected human and murine tumor cell lines. A 3-day exposure to Taurolidine inhibited the growth of all of the cell lines evaluated with IC(50)s ranging from 9.6-34.2 microM. Studies to identify the mechanism responsible for this effect were conducted in NIH-3T3 murine fibroblasts and the PA-1 and SKOV-3 human ovarian tumor cells. These studies revealed that a 48-h exposure to taurolidine had little effect on cell cycle distribution in PA-1 and SKOV-3 cells but significantly increased the appearance of DNA debris in the sub-G(0)/G(1) region, an effect consistent with an induction of apoptosis. In contrast, in NIH-3T3 cells, taurolidine exposure did not increase DNA debris in the sub-G(0)/G(1) region. Additional studies assessed phosphotidylserine externalization after a 24-h exposure to taurolidine using annexin-V binding as a cell surface marker. These studies revealed that taurolidine increased the percentage of annexin-V-positive cells by 4-fold and 3-fold in PA-1 and SKOV-3 cells, respectively. In NIH-3T3 cells, taurolidine exposure slightly increased ( approximately 5%) annexin-V binding. Parallel studies revealed that exposure to taurolidine also resulted in poly(ADP-ribose) polymerase cleavage in both ovarian tumor cell lines but not in NIH-3T3 cells. Finally, murine-based studies were conducted to assess the antineoplastic activity of three consecutive daily i.p. bolus injections of taurolidine at doses ranging from 5-mg injection/mouse to 30-mg injection/mouse. The 20-mg injection dose produced approximately 10% mortality and was identified as the maximally tolerated dose in this model

  13. Anticancer activity of streptochlorin, a novel antineoplastic agent, in cholangiocarcinoma

    Directory of Open Access Journals (Sweden)

    Kwak TW

    2015-04-01

    Full Text Available Tae Won Kwak,1,* Hee Jae Shin,2,* Young-Il Jeong,1 Myoung-Eun Han,3 Sae-Ock Oh,3 Hyun-Jung Kim,4 Do Hyung Kim,5 Dae Hwan Kang1 1Biomedical Research Institute, Pusan National University Hospital, Busan, 2Marine Natural Products Chemistry Laboratory, Korea Institute of Ocean Science and Technology, Ansan, 3Department of Anatomy, School of Medicine, Pusan National University, Gyeongnam, 4Genewel Co Ltd. Gyeonggi-do, 5School of Medicine, Pusan National University, Yangsan, Gyeongnam, Republic of Korea *These authors contributed equally to this work Background: The aim of this study is to investigate the anticancer activity of streptochlorin, a novel antineoplastic agent, in cholangiocarcinoma. Methods: The anticancer activity of streptochlorin was evaluated in vitro in various cholangiocarcinoma cell lines for apoptosis, proliferation, invasiveness, and expression of various protein levels. A liver metastasis model was prepared by splenic injection of HuCC-T1 cholangiocarcinoma cells using a BALB/c nude mouse model to study the systemic antimetastatic efficacy of streptochlorin 5 mg/kg at 8 weeks. The antitumor efficacy of subcutaneously injected streptochlorin was also assessed using a solid tumor xenograft model of SNU478 cells for 22 days in the BALB/c nude mouse. Results: Streptochlorin inhibited growth and secretion of vascular endothelial growth factor by cholangiocarcinoma cells in a dose-dependent manner and induced apoptosis in vitro. In addition, streptochlorin effectively inhibited invasion and migration of cholangiocarcinoma cells. Secretion of vascular endothelial growth factor and activity of matrix metalloproteinase-9 in cholangiocarcinoma cells were also suppressed by treatment with streptochlorin. Streptochlorin effectively regulated metastasis of HuCC-T1 cells in a mouse model of liver metastasis. In a tumor xenograft study using SNU478 cells, streptochlorin significantly inhibited tumor growth without changes in body weight

  14. Off-Label and Off-NCCN Guidelines Uses of Antineoplastic Drugs in China

    OpenAIRE

    Weilan Wang; Man Zhu; Daihong Guo; Chao Chen; Dongxiao Wang; Fei Pei; Liang Ma

    2013-01-01

    Background To evaluate off-label and off-NCCN guidelines uses of antineoplastic drugs in a major Chinese hospital. Methods: Totally 1122 patients were selected from July to December 2011. Then, the off-label and off-NCCN guidelines uses of antineoplastic drugs were analyzed. Results: In 798 of 1122 patients (71.12%), drugs were used for off-label. In 317 of 1122 patients (28.25%), the drugs were prescribed for off-label and off-NCCN guidelines. 2591 medical orders for 1122 patients, 1051/2591...

  15. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-05-01

    Occupational exposure to antineoplastic drugs is associated with genotoxic effects, although comet assay analyzed parameters were higher in exposed comparing with controls, were not significant. Also the study of the susceptibility biomarkers did not show statistical significant differences, the small size of our sample hampered the finding of a possible association, let alone a causality relationship.

  16. Infiltrative Lung Diseases: Complications of Novel Antineoplastic Agents in Patients with Hematological Malignancies

    Directory of Open Access Journals (Sweden)

    Bobbak Vahid

    2008-01-01

    Full Text Available Infiltrative lung disease is a well-known complication of antineoplastic agents in patients with hematological malignancies. Novel agents are constantly being added to available treatments. The present review discusses different pulmonary syndromes, pathogenesis and management of these novel agents.

  17. Gastrointestinal and liver infections in children undergoing antineoplastic chemotherapy in the years 2000

    Science.gov (United States)

    Castagnola, Elio; Ruberto, Eliana; Guarino, Alfredo

    2016-01-01

    AIM: To review gastrointestinal and liver infections in children undergoing antineoplastic chemotherapy. To look at gut microflora features in oncology children. METHODS: We selected studies published after year 2000, excluding trials on transplanted pediatric patients. We searched English language publications in MEDLINE using the keywords: “gastrointestinal infection AND antineoplastic chemotherapy AND children”, “gastrointestinal infection AND oncology AND children”, “liver infection AND antineoplastic chemotherapy AND children”, “liver abscess AND chemotherapy AND child”, “neutropenic enterocolitis AND chemotherapy AND children”, “thyphlitis AND chemotherapy AND children”, “infectious diarrhea AND children AND oncology”, “abdominal pain AND infection AND children AND oncology”, “perianal sepsis AND children AND oncology”, “colonic pseudo-obstruction AND oncology AND child AND chemotherapy”, “microflora AND children AND malignancy”, “microbiota AND children AND malignancy”, “fungal flora AND children AND malignancy”. We also analysed evidence from several articles and book references. RESULTS: Gastrointestinal and liver infections represent a major cause of morbidity and mortality in children undergoing antineoplastic chemotherapy. Antineoplastic drugs cause immunosuppression in addition to direct toxicity, predisposing to infections, although the specific risk is variable according to disease and host features. Common pathogens potentially induce severe diseases whereas opportunistic microorganisms may attack vulnerable hosts. Clinical manifestations can be subtle and not specific. In addition, several conditions are rare and diagnostic process and treatments are not standardized. Diagnosis may be challenging, however early diagnosis is needed for quick and appropriate interventions. Interestingly, the source of infection in those children can be exogenous or endogenous. Indeed, mucosal damage may allow the

  18. Drug lag for antineoplastic and immunomodulating agent approvals in India compared with the US and EU approvals

    Directory of Open Access Journals (Sweden)

    Bhaven C. Kataria

    2016-04-01

    Conclusions: This study confirms that India lag behind the US and EU regions in terms of total number of new drug approvals for antineoplastic and immunomodulating agents. There is a substantial approval delay in India compared to the US and EU regions. Further detailed analyses are necessary to find the reasons and impacts of drug lag for new antineoplastic and immunomodulating agents in India. [Int J Basic Clin Pharmacol 2016; 5(2.000: 335-340

  19. Antineoplastic effects of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in cancer cell lines

    OpenAIRE

    Chavez-Blanco, Alma; Perez-Plasencia, Carlos; Perez-Cardenas, Enrique; Carrasco-Legleu, Claudia; Rangel-Lopez, Edgar; Segura-Pacheco, Blanca; Taja-Chayeb, Lucia; Trejo-Becerril, Catalina; Gonzalez-Fierro, Aurora; Candelaria, Myrna; Cabrera, Gustavo; Duenas-Gonzalez, Alfonso

    2006-01-01

    Background Among the epigenetic alterations occurring in cancer, DNA hypermethylation and histone hypoacetylation are the focus of intense research because their pharmacological inhibition has shown to produce antineoplastic activity in a variety of experimental models. The objective of this study was to evaluate the combined antineoplastic effect of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in a panel of cancer cell lines. Results Hydralazi...

  20. Antineoplastic effects of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in cancer cell lines

    OpenAIRE

    Candelaria Myrna; Gonzalez-Fierro Aurora; Trejo-Becerril Catalina; Taja-Chayeb Lucia; Segura-Pacheco Blanca; Rangel-Lopez Edgar; Carrasco-Legleu Claudia; Perez-Cardenas Enrique; Perez-Plasencia Carlos; Chavez-Blanco Alma; Cabrera Gustavo; Duenas-Gonzalez Alfonso

    2006-01-01

    Abstract Background Among the epigenetic alterations occurring in cancer, DNA hypermethylation and histone hypoacetylation are the focus of intense research because their pharmacological inhibition has shown to produce antineoplastic activity in a variety of experimental models. The objective of this study was to evaluate the combined antineoplastic effect of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in a panel of cancer cell lines. Results ...

  1. Evaluation of an oral preventive protocol in children with acute lymphoblastic leukemia

    OpenAIRE

    Costa Edja Maria Melo de Brito; Fernandes Maria Zélia; Quinderé Lêda Bezerra; Souza Lélia Batista de; Pinto Leão Pereira

    2003-01-01

    This study was designed to assess the effectiveness of a preventive oral protocol in children receiving antineoplastic treatment for acute lymphoblastic leukemia (ALL) before initiating a larger intervention study. During a seven month period, fourteen children from two to ten years old with a diagnosis of ALL were evaluated. Patients with ALL who received a 0.12% chlorhexidine mouth rinse (seven children) were compared to a control group of patients who were not given the same preventive tre...

  2. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    OpenAIRE

    Carina Ladeira; Susana Viegas; Gomes, Manuel C.

    2015-01-01

    Antineoplastic drugs are a heterogeneous group of chemicals used in the treatment of cancer, and have been proved by IARC to be mutagens, carcinogens and teratogens agents (Fucic et al., 1998; Burgaz et al., 1999; Sessink & Bos, 1999; Bouraoui et al., 2011; Gulten et al., 2011; Buschini et al., 2013). In general, chemicals that interact directly with DNA by biding covalently or by intercalating, or indirectly by interfering with DNA synthesis, were among the first chemotherapeutics developed ...

  3. Adherence to Safe Handling Guidelines by Health Care Workers Who Administer Antineoplastic Drugs

    OpenAIRE

    Boiano, James M; Steege, Andrea L.; Sweeney, Marie H.

    2014-01-01

    The toxicity of antineoplastic drugs is well documented. Many are known or suspected human carcinogens where no safe exposure level exists. Authoritative guidelines developed by professional practice organizations and federal agencies for the safe handling of these hazardous drugs have been available for nearly three decades. As a means of evaluating the extent of use of primary prevention practices such as engineering, administrative and work practice controls, personal protective equipment ...

  4. Can occupational exposure to antineoplastic drugs increase levels of an inflammatory trigger?

    OpenAIRE

    T. Kamalasundar; Padmaja Udaykumar; Prabin Shah

    2015-01-01

    Background: Antineoplastic drugs (AND) are known to cause collateral damage to normal cells by oxidative stress. This study was conducted to check for oxidative stress in occupational exposure to these drugs using advanced oxidation protein products (AOPP). Methods: Cross-sectional comparison of serum AOPP levels of 33 nurses occupationally exposed and serum AOPP levels of 30 nurses not exposed using modified AOPP method. Results: Serum AOPP levels were significantly increased (p

  5. Anti-inflammatory drugs and uterine cervical cancer cells: Antineoplastic effect of meclofenamic acid

    OpenAIRE

    Soriano-Hernandez, Alejandro D; MADRIGAL-PÉREZ, DANIELA; GALVAN-SALAZAR, HECTOR R.; Martinez-Fierro, Margarita L; Laura L. Valdez-Velazquez; Espinoza-Gómez, Francisco; VAZQUEZ-VUELVAS, OSCAR F.; OLMEDO-BUENROSTRO, BERTHA A.; Guzman-Esquivel, Jose; Rodriguez-Sanchez, Iram P.; LARA-ESQUEDA, AGUSTIN; MONTES-GALINDO, DANIEL A.; Delgado-Enciso, Ivan

    2015-01-01

    Uterine cervical cancer (UCC) is one of the main causes of cancer-associated mortality in women. Inflammation has been identified as an important component of this neoplasia; in this context, anti-inflammatory drugs represent possible prophylactic and/or therapeutic alternatives that require further investigation. Anti-inflammatory drugs are common and each one may exhibit a different antineoplastic effect. As a result, the present study investigated different anti-inflammatory models of UCC ...

  6. Recent Advances on Pathophysiology, Diagnostic and Therapeutic Insights in Cardiac Dysfunction Induced by Antineoplastic Drugs

    OpenAIRE

    Marilisa Molinaro; Pietro Ameri; Giancarlo Marone; Mario Petretta; Pasquale Abete; Fabio Di Lisa; Sabino De Placido; Domenico Bonaduce; Tocchetti, Carlo G

    2015-01-01

    Along with the improvement of survival after cancer, cardiotoxicity due to antineoplastic treatments has emerged as a clinically relevant problem. Potential cardiovascular toxicities due to anticancer agents include QT prolongation and arrhythmias, myocardial ischemia and infarction, hypertension and/or thromboembolism, left ventricular (LV) dysfunction, and heart failure (HF). The latter is variable in severity, may be reversible or irreversible, and can occur soon after or as a delayed cons...

  7. Enhanced Topical and Transdermal Delivery of Antineoplastic and Antiviral Acyclic Nucleoside Phosphonate cPr-PMEDAP

    Czech Academy of Sciences Publication Activity Database

    Vávrová, K.; Kovaříková, P.; Školová, B.; Líbalová, M.; Roh, J.; Čáp, R.; Holý, Antonín; Hrabálek, A.

    2011-01-01

    Roč. 28, č. 12 (2011), s. 3105-3115. ISSN 0724-8741 R&D Projects: GA MŠk 1M0508 Grant ostatní: GA ČR(CZ) GAP207/11/0365 Institutional research plan: CEZ:AV0Z40550506 Keywords : acyclic nucleoside phosphonates * antivirals * antineoplastics * permeation enhancer * topical skin application * transdermal delivery Subject RIV: CC - Organic Chemistry Impact factor: 4.093, year: 2011

  8. Reversible posterior leukoencephalopathy syndrome and anti-neoplastic agents: a review

    OpenAIRE

    Farheen M. Shah-Khan; Prabodh Shah; Daryl Pinedo

    2011-01-01

    Reversible Posterior Leukoencephalopathy Syndrome (RPLS) is a well recognized entity with a variety of benign and malignant conditions. Recently it has been found to be associated with the use of anti-neoplastic agents including targeted therapies. RPLS occurs rapidly with the use of some drugs and more slowly with others. Combined therapies are associated with a more frequent and more rapid presentation. This review was based on a literature search for English Language articles concerning RP...

  9. Bioactive substances with anti-neoplastic efficacy from marine invertebrates: Porifera and Coelenterata

    OpenAIRE

    Sima, Peter; Vetvicka, Vaclav

    2011-01-01

    An ever increasing demand for new lead compounds in the pharmaceutical industry has led scientists to search for natural bioactive products. Based on this extensive research, marine invertebrates now represent a rich source of novel substances with significant anti-neoplastic activities. As the current approach of synthesizing new and chemically modifying old drugs seems to have slowed down, and the identification of new anticancer drugs is not too promising, a new approach is clearly needed....

  10. Monitoring of Oxidative Stress in Nurses Occupationally Exposed to Antineoplastic Drugs

    OpenAIRE

    Mahboob, M.; Rahman, M. F.; Rekhadevi, P. V.; Sailaja, N.; Balasubramanyam, A; Prabhakar, P. V.; Singh, Shailendra Pratap; Reddy, Utkarsh A.; Rao, G. Sankara; Grover, Paramjit

    2012-01-01

    Antineoplastic drugs (ANDs) have been in clinical usage for more than five decades. The nonselective mechanism of action of ANDs between cancerous and noncancerous cells had well documented side effects such as acute symptoms, reproductive health issues, and potential cancer development in healthcare workers as a result of occupational exposure. The anticancer mechanism of ANDs is the generation of reactive oxygen species (ROS) which are responsible for various side effects in patients underg...

  11. Occupational Exposure to Antineoplastic Drugs: Identification of Job Categories Potentially Exposed throughout the Hospital Medication System

    OpenAIRE

    Hon, Chun-Yip; Teschke, Kay; Chua, Prescillia; Venners, Scott; Nakashima, Lynne

    2011-01-01

    Objectives Studies examining healthcare workers' exposure to antineoplastic drugs have focused on the drug preparation or drug administration areas. However, such an approach has probably underestimated the overall exposure risk as the drugs need to be delivered to the facility, transported internally and then disposed. The objective of this study is to determine whether drug contamination occurs throughout a facility and, simultaneously, to identify those job categories that are potentially ...

  12. Peroxisome Proliferator-Activated Receptors (PPARs) as Potential Inducers of Antineoplastic Effects in CNS Tumors

    OpenAIRE

    Lars Tatenhorst; Eric Hahnen; Heneka, Michael T

    2008-01-01

    The peroxisome proliferator-activated receptors (PPARs) are ligand-inducible transcription factors which belong to the superfamily of nuclear hormone receptors. In recent years it turned out that natural as well as synthetic PPAR agonists exhibit profound antineoplastic as well as redifferentiation effects in tumors of the central nervous system (CNS). The molecular understanding of the underlying mechanisms is still emerging, with partially controverse findings reported by a number of studie...

  13. Cancer incidence and adverse pregnancy outcome in registered nurses potentially exposed to antineoplastic drugs

    OpenAIRE

    Le Nhu D; Teschke Kay; Chow Yat; Lorenzi Maria; Beking Kris; Spinelli John J; Ratner Pamela A; Gallagher Richard P; Dimich-Ward Helen

    2010-01-01

    Abstract Background To determine the relationships of potential occupational exposure to antineoplastic drugs with cancer incidence and adverse pregnancy outcomes in a historical prospective cohort study of female registered nurses (RNs) from British Columbia, Canada (BC). Methods Female RNs registered with a professional regulatory body for at least one year between 1974 and 2000 formed the cohort (n = 56,213). The identifier file was linked to Canadian cancer registries. An RN offspring coh...

  14. Low Concentration of Quercetin Antagonizes the Cytotoxic Effects of Anti-Neoplastic Drugs in Ovarian Cancer

    OpenAIRE

    Na Li; Chaoyang Sun; Bo Zhou; Hui Xing; Ding Ma; Gang Chen; Danhui Weng

    2014-01-01

    OBJECTIVE: The role of Quercetin in ovarian cancer treatment remains controversial, and the mechanism is unknown. The aim of this study was to investigate the therapeutic effects of Quercetin in combination with Cisplatin and other anti-neoplastic drugs in ovarian cancer cells both in vitro and in vivo, along with the molecular mechanism of action. METHODS: Quercetin treatment at various concentrations was examined in combination with Cisplatin, taxol, Pirarubicin and 5-Fu in human epithelial...

  15. Chromosomal damage among medical staff occupationally exposed to volatile anesthetics, antineoplastic drugs, and formaldehyde

    Czech Academy of Sciences Publication Activity Database

    Mušák, L.; Šmerhovský, Z.; Halásová, E.; Osina, O.; Letková, L.; Vodičková, Ludmila; Poláková, Veronika; Buchancová, J.; Hemminki, K.; Vodička, Pavel

    2013-01-01

    Roč. 39, č. 6 (2013), s. 618-630. ISSN 0355-3140 Grant ostatní: MŠVV(SK) 26220220111; UK(SK) 1/0576/10 VEGA; MZd(SK) 2007/48-UK-13; GA MŠMT(CZ) Prvouk-P27/LF1/1 Institutional support: RVO:68378041 Keywords : anesthesiologist * antineoplastic drug * chromosomal aberration Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.095, year: 2013

  16. Study on Chromosome Damage Among Nurses Occupationally Exposed to Antineoplastic Drugs in an Oncology Department

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    @@ INTRODUCTION Many antineoplastic agents have been shown to be mutagenic, teratogenic and carcinogenic in experimental animals and in vitro test systems. Epidemiological data on the association of secondary neoplasms with a specific chemotherapeutic treatment are available on some 30 agents. Several previous studies concerning hospital personnel have indicated that occupational exposure to cytostatic drugs may be detected by genotoxicological biomonitoring methods, e.g., comet assay, SCEs, chromosomal aberration and micronucleus test.

  17. The antineoplastic effect of low-molecular-weight heparins – a literature review

    OpenAIRE

    Bochenek, Justyna; Püsküllüoğlu, Mirosława; Krzemieniecki, Krzysztof

    2013-01-01

    There is some evidence for the antitumor effect of heparins, especially the low-molecular-weight ones. The authors discuss the potential mechanism of this antineoplastic effect and present results from several in vitro and in vivo experiments. The clinical trials concerning the impact of low-molecular-weight heparins on the tumor and on the patients’ survival are described. The objective was to find out if heparins could be administered as an antitumor drug, independently of their anticoagula...

  18. Isolation and Characterization of Antineoplastic Alkaloids from Catharanthus Roseus L. Don. Cultivated in Egypt

    OpenAIRE

    Shams, Khaled A; Nazif, Naglaa M; Abdel Azim, Nahla S; Abdel Shafeek, Khaled A; El-Missiry, Mostafa M.; Ismail, Shams I; Seif El Nasr, Medhat M

    2009-01-01

    Vinblastine and vincristine (the antileukemic agents) were isolated, in a pure form, from Catharanthus roseus L. Don., cultivated in Egypt, by several chromatographic techniques. Five modified methods for the preparation of total alkaloids were carried out. All the isolated mixtures were evaluated by HPLC and HPTLC analyses. The antineoplastic alkaloids; vinblastine and vincristine, were isolated by the use of vacuum liquid chromatographic column on silica gel : aluminium oxide (1:1) mixed be...

  19. Redox-directed cancer therapeutics: Taurolidine and Piperlongumine as broadly effective antineoplastic agents (review).

    Science.gov (United States)

    Möhler, Hanns; Pfirrmann, Rolf W; Frei, Karl

    2014-10-01

    Targeting the oxygen stress response pathway is considered a promising strategy to exert antineoplastic activity in a broad spectrum of tumor types. Supporting this view, we summarize the mechanism of action of Taurolidine and Piperlongumine, two antineoplastic agents with strikingly broad tumor selectivity. Taurolidine enhances the oxidative stress (ROS) selectively in tumor cells. Its cytotoxicity for various tumor cells in vitro and in vivo, which includes tumor stem cells, is based on the induction of programmed cell death, largely via apoptosis but also necroptosis and autophagy. The redox-directed mechanism of action of Taurolidine is apparent from the finding that reducing agents e.g., N-acetylcysteine or glutathione impair its cytotoxicity, while its effectiveness is enhanced by agents which inhibit the cellular anti‑oxidant capacity. A similar redox-directed antineoplastic action is shown by Piperlongumine, a recently described experimental drug of plant origin. Taurolidine is particularly advantageous in surgical oncology as this taurine-derivative can be applied perioperatively or systemically with good tolerability as shown in initial clinical applications. PMID:25175943

  20. Cardiotoxicity of copper-based antineoplastic drugs casiopeinas is related to inhibition of energy metabolism

    International Nuclear Information System (INIS)

    Isolated rat hearts were perfused with glucose, octanoate or glucose + octanoate and different concentrations of the copper-based antineoplastic drugs casiopeina II-gly (CSII) or casiopeina III-i-a (CSIII). In isolated perfused hearts with glucose + octanoate, both casiopeinas induced diminution in cardiac work and O2 consumption with half-maximal inhibitory concentrations (IC5) of 4 (CSII) and 4.6 (CSIII) μM, after 1 h of perfusion. Strong inhibition of the pyruvate and 2-oxoglutarate dehydrogenases as well as total creatine kinase by casiopeinas suggested that ATP generation by oxidative phosphorylation and its transfer towards myofibrils were targets for these drugs. In consequence, the cellular contents of ATP and phosphocreatine were also lowered by casiopeinas. Remarkably, casiopeinas were less toxic than adriamycin (IC5 = 2.6 μM), a well-known potent cardiotoxic and antineoplastic drug, which has a wide clinical use. In an open-chest animal, which is a more physiological model than the isolated heart, femoral administration of 1 μM drug revealed that CSII was innocuous very likely due to strong binding to serum albumin, whereas adriamycin induced again a potent cardiotoxic effect (diminution in heart rate and severe depression of systolic blood pressure). Thus, it seems that casiopeinas are a group of new antineoplastic drugs with milder secondary toxic effects than proven drugs such as adriamycin

  1. Toxicity classification and evaluation of four pharmaceuticals classes: antibiotics, antineoplastics, cardiovascular, and sex hormones

    International Nuclear Information System (INIS)

    Four different classes of environmental concern are quantitatively and qualitatively assessed for environmental hazards; antibiotics (n = 226), antineoplastics (n = 81), cardiovascular (n = 272), and sex hormones (n 92). These along with an ECOSAR scan of all pharmaceuticals (n = 2848) were then classified according to the OECD aquatic toxicity classification system. The predicted species susceptibility is: daphnid > fish > algae, and the predicted rank order of relative toxicity: sex hormones > cardiovascular antibiotics > antineoplastics (Table 1). Generally, a relatively large proportion (1/3) of all pharmaceuticals are potentially very toxic to aquatic organisms (Table 2). The qualitative risk assessment ranking relative to probability and potential severity for human and environmental health effects is: antibiotics > sex hormones > cardiovascular > antineoplastics. (Q)SARs and pharmacodynamic information should be used to prioritize and steer experimental risk assessments of pharmaceuticals, and potentially, also be used in new drug discovery optimizing efficacy and in minimising environmental hazards of new products. Nuclear receptors are relatively well conserved in evolution. Currently, antibacterial resistance represents the most significant human health hazard, and potentially the largest non-target organism hazard is sex hormones acting as endocrine modulators in wildlife. Data for the individual compounds are accessible via http://www.uoguelph.ca/~hsander/

  2. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons....... We have implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single......; benchmarks show that the approach is practical....

  3. Antineoplastic effects of an Aurora B kinase inhibitor in breast cancer

    Directory of Open Access Journals (Sweden)

    Velazquez-Torres Guermarie

    2010-02-01

    Full Text Available Abstract Background Aurora B kinase is an important mitotic kinase involved in chromosome segregation and cytokinesis. It is overexpressed in many cancers and thus may be an important molecular target for chemotherapy. AZD1152 is the prodrug for AZD1152-HQPA, which is a selective inhibitor of Aurora B kinase activity. Preclinical antineoplastic activity of AZD1152 against acute myelogenous leukemia, multiple myeloma and colorectal cancer has been reported. However, this compound has not been evaluated in breast cancer, the second leading cause of cancer deaths among women. Results The antineoplastic activity of AZD1152-HQPA in six human breast cancer cell lines, three of which overexpress HER2, is demonstrated. AZD1152-HQPA specifically inhibited Aurora B kinase activity in breast cancer cells, thereby causing mitotic catastrophe, polyploidy and apoptosis, which in turn led to apoptotic death. AZD1152 administration efficiently suppressed the tumor growth in a breast cancer cell xenograft model. In addition, AZD1152 also inhibited pulmonary metastatic nodule formation in a metastatic breast cancer model. Notably, it was also found that the protein level of Aurora B kinase declined after inhibition of Aurora B kinase activity by AZD1152-HQPA in a time- and dose-dependent manner. Investigation of the underlying mechanism suggested that AZD1152-HQPA accelerated protein turnover of Aurora B via enhancing its ubiquitination. Conclusions It was shown that AZD1152 is an effective antineoplastic agent for breast cancer, and our results define a novel mechanism for posttranscriptional regulation of Aurora B after AZD1152 treatment and provide insight into dosing regimen design for this kinase inhibitor in metastatic breast cancer treatment.

  4. Low concentration of quercetin antagonizes the cytotoxic effects of anti-neoplastic drugs in ovarian cancer.

    Directory of Open Access Journals (Sweden)

    Na Li

    Full Text Available OBJECTIVE: The role of Quercetin in ovarian cancer treatment remains controversial, and the mechanism is unknown. The aim of this study was to investigate the therapeutic effects of Quercetin in combination with Cisplatin and other anti-neoplastic drugs in ovarian cancer cells both in vitro and in vivo, along with the molecular mechanism of action. METHODS: Quercetin treatment at various concentrations was examined in combination with Cisplatin, taxol, Pirarubicin and 5-Fu in human epithelial ovarian cancer C13* and SKOV3 cells. CCK8 assay and Annexin V assay were for cell viability and apoptosis analysis, immunofluorescence assay, DCFDA staining and realtime PCR were used for reactive oxygen species (ROS-induced injury detection and endogenous antioxidant enzymes expression. Athymic BALB/c-nu nude mice were injected with C13*cells to obtain a xenograft model for in vivo studies. Immunohistochemical analysis was carried out to evaluate the ROS-induced injury and SOD1 activity of xenograft tumors. RESULTS: Contrary to the pro-apoptotic effect of high concentration (40 µM-100 µM of Quercetin, low concentrations (5 µM-30 µM of Quercetin resulted in varying degrees of attenuation of cytotoxicity of Cisplatin treatment when combined with Cisplatin. Similar anti-apoptotic effects were observed when Quercetin was combined with other anti-neoplastic agents: Taxol, Pirarubicin and 5-Fluorouracil (5-Fu. Low concentrations of Quercetin were observed to suppress ROS-induced injury, reduce intracellular ROS level and increase the expression of endogenous antioxidant enzymes, suggesting a ROS-mediated mechanism of attenuating anti-neoplastic drugs. In xenogeneic model, Quercetin led to a substantial reduction of therapeutic efficacy of Cisplatin along with enhancing the endogenous antioxidant enzyme expression and reducing ROS-induced damage in xenograft tumor tissue. CONCLUSION: Taken together, these data suggest that Quercetin at low concentrations

  5. Can the clinical course of cancer be influenced by non-antineoplastic drugs?

    OpenAIRE

    Brandes, L. J.; Friesen, L A

    1995-01-01

    Laboratory and anecdotal clinical evidence suggests that some common non-antineoplastic drugs may affect the course of cancer. The authors present two cases that appear to be consistent with such a possibility: that of a 63-year-old woman in whom a high-grade angiosarcoma of the forehead improved after discontinuation of lithium therapy and then progressed rapidly when treatment with carbamazepine was started, and that of a 74-year-old woman with metastatic adenocarcinoma of the colon that re...

  6. Inhibitions of Several Antineoplastic Drugs on Serum Sialic Acid Levels in Mice Bearing Tumors

    OpenAIRE

    Lu, Da-Yong; Xu, Jing; Lu, Ting-Ren; Wu, Hong-Ying; Xu, Bin

    2012-01-01

    Six murine tumors, including ascetic tumors HepA, EC, P388 leukemia, S180 and solid tumor S180, and Lewis lung carcinoma, were employed in this work. The free sialic acid concentrations in both blood and ascites were measured in tumor-bearing mice. The results showed that the content of sialic acids in blood was increased in tumor growth and certain tumor types. Higher sialic acid content was observed in ascites than that present in blood. The influence of antineoplastic agents (vincristine, ...

  7. The Effect of Antineoplastic Drugs in a Male Spontaneous Mammary Tumor Model

    OpenAIRE

    Shishido, Stephanie N.; Faulkner, Emma B.; Beck, Amanda; Thu A. Nguyen

    2013-01-01

    Male breast cancer is a rare disease. The limited number of clinical cases has led to the primary treatments for men being derived from female breast cancer studies. Here the transgenic strain FVB/N-Tg(MMTV-PyVT)634Mul/J (also known as PyVT) was used as a model system for measuring tumor burden and drug sensitivity of the antineoplastic drugs tamoxifen, cisplatin, and paclitaxel on tumorigenesis at an early stage of mammary carcinoma development in a male mouse model. Cisplatin treatment sign...

  8. Applying ligands profiling using multiple extended electron distribution based field templates and feature trees similarity searching in the discovery of new generation of urea-based antineoplastic kinase inhibitors.

    Directory of Open Access Journals (Sweden)

    Eman M Dokla

    Full Text Available This study provides a comprehensive computational procedure for the discovery of novel urea-based antineoplastic kinase inhibitors while focusing on diversification of both chemotype and selectivity pattern. It presents a systematic structural analysis of the different binding motifs of urea-based kinase inhibitors and the corresponding configurations of the kinase enzymes. The computational model depends on simultaneous application of two protocols. The first protocol applies multiple consecutive validated virtual screening filters including SMARTS, support vector-machine model (ROC = 0.98, Bayesian model (ROC = 0.86 and structure-based pharmacophore filters based on urea-based kinase inhibitors complexes retrieved from literature. This is followed by hits profiling against different extended electron distribution (XED based field templates representing different kinase targets. The second protocol enables cancericidal activity verification by using the algorithm of feature trees (Ftrees similarity searching against NCI database. Being a proof-of-concept study, this combined procedure was experimentally validated by its utilization in developing a novel series of urea-based derivatives of strong anticancer activity. This new series is based on 3-benzylbenzo[d]thiazol-2(3H-one scaffold which has interesting chemical feasibility and wide diversification capability. Antineoplastic activity of this series was assayed in vitro against NCI 60 tumor-cell lines showing very strong inhibition of GI(50 as low as 0.9 uM. Additionally, its mechanism was unleashed using KINEX™ protein kinase microarray-based small molecule inhibitor profiling platform and cell cycle analysis showing a peculiar selectivity pattern against Zap70, c-src, Mink1, csk and MeKK2 kinases. Interestingly, it showed activity on syk kinase confirming the recent studies finding of the high activity of diphenyl urea containing compounds against this kinase. Allover, the new series

  9. Antineoplastic and apoptotic potential of traditional medicines thymoquinone and diosgenin in squamous cell carcinoma.

    Directory of Open Access Journals (Sweden)

    Subhasis Das

    Full Text Available Thymoquinone (TQ and diosgenin (DG, the active ingredients obtained from black cumin (Nigella sativa and fenugreek (Trigonella foenum graecum, respectively, exert potent bioactivity, including anticancer effects. This study investigated the antineoplastic activity of these agents against squamous cell carcinoma in vitro and sarcoma 180-induced tumors in vivo. TQ and DG inhibited cell proliferation and induced cytotoxicity in A431 and Hep2 cells. These agents induced apoptosis by increasing the sub-G(1 population, LIVE/DEAD cytotoxicity, chromatin condensation, DNA laddering and TUNEL-positive cells significantly (P<0.05. Increased Bax/Bcl-2 ratio, activation of caspases and cleavage of poly ADP ribose polymerase were observed in treated cells. These drugs inhibited Akt and JNK phosphorylations, thus inhibiting cell proliferation while inducing apoptosis. In combination, TQ and DG had synergistic effects, resulting in cell viability as low as 10%. In a mouse xenograft model, a combination of TQ and DG significantly (P<0.05 reduced tumor volume, mass and increased apoptosis. TQ and DG, alone and in combination, inhibit cell proliferation and induce apoptosis in squamous cell carcinoma. The combination of TQ and DG is a potential antineoplastic therapy in this common skin cancer.

  10. Rational Protocols

    Science.gov (United States)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  11. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  12. Computerized cyclic voltammetric detection after HPLC of the antineoplastic agents etoposide, teniposide, adriamycin and its metabolite adriamycinol in urine samples

    OpenAIRE

    Ploegmakers, H. H. J. L.; Moritz, P. A.; Toll, P. J. M. M.; Oort, W.J. van

    1989-01-01

    A computerized electrochemical detection system for application after HPLC, provided with a cyclic voltammetric oxidative and reductive module, is described for the on-line qualitative determination of electroactive antineoplastic agents and metabolites in urine samples, collected from cancer patients, following intravenous administration. The application of two cyclic voltammetric detection modes provides an insight into both oxidative and reductive electrode reactions of compounds, passing ...

  13. Off-Label and Off-NCCN Guidelines Uses of Antineoplastic Drugs in China

    Directory of Open Access Journals (Sweden)

    Weilan Wang

    2013-05-01

    Full Text Available Background: To evaluate off-label and off-NCCN guidelines uses of antineoplastic drugs in a major Chinese hospital.Methods: Totally 1122 patients were selected from July to December 2011. Then, the off-label and off-NCCN guidelines uses of antineoplastic drugs were analyzed.Results: In 798 of 1122 patients (71.12%, drugs were used for off-label. In 317 of 1122 patients (28.25%, the drugs were prescribed for off-label and off-NCCN guidelines. 2591 medical orders for 1122 patients, 1051/2591 (40.56% medical orders were off-label; 445/2591(17.17% medical orders were off-label and off-NCCN guidelines. In 445 off-label and off-NCCN medical orders, 399 (89.66% were unapproved indications, 38 (8.54% were unapproved drug concentration and 12 (2.70% were unapproved route of administration. Percentage of off-label and off-NCCN guidelines drug uses in male was higher than that in female (21.92% vs. 11.39%, P<0.01. Compared with other lines of treatment, percentage of off-label and off-NCCN guidelines drug uses in postoperative adjuvant was the smallest (P<0.01 and percentage in three or multi-line treatments was the highest (P<0.01. The pancreatic cancer possessed the highest percentage (38.74% of off-label and off-NCCN guidelines drug uses among all types of cancer (P<0.01.Conclusion: Off-label uses of antineoplastic drugs are generally common in China hospitals based on NCCN guidelines. The fact suggests that anti-tumor treatment was relatively standard in China. Off-label and off-NCCN guidelines drug uses were mainly for individual treatment. Doctors should fully consider the adverse drug reaction, contraindication, cautions and increase the drug security monitoring. Uncorrected drug concentration should be avoided for drug risk

  14. Cancer incidence and adverse pregnancy outcome in registered nurses potentially exposed to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Le Nhu D

    2010-09-01

    Full Text Available Abstract Background To determine the relationships of potential occupational exposure to antineoplastic drugs with cancer incidence and adverse pregnancy outcomes in a historical prospective cohort study of female registered nurses (RNs from British Columbia, Canada (BC. Methods Female RNs registered with a professional regulatory body for at least one year between 1974 and 2000 formed the cohort (n = 56,213. The identifier file was linked to Canadian cancer registries. An RN offspring cohort from 1986 was created by linkages with the BC Birth and Health Status Registries. Exposure was assessed by work history in oncology or cancer agencies (method 1 and by estimating weighted duration of exposure developed from a survey of pharmacists and nursing unit administrators of all provincial hospitals and treatment centers and the work history of the nurses (method 2. Relative risks (RR were calculated using Poisson regression for cancer incidence and odds ratios (OR were calculated for congenital anomaly, stillbirth, low birth weight, and prematurity incidence, with 95% confidence intervals. Results In comparison with other female RNs, method 1 revealed that RNs who ever worked in a cancer center or in an oncology nursing unit had an increased risk of breast cancer (RR = 1.83; 95% CI = 1.03 - 3.23, 12 cases and their offspring were at risk for congenital anomalies of the eye (OR = 3.46, 95% CI = 1.08 - 11.14, 3 cases. Method 2 revealed that RNs classified as having the highest weighted durations of exposure to antineoplastic drugs had an excess risk of cancer of the rectum (RR = 1.87, 95% CI = 1.07 - 3.29, 14 cases. No statistically significant increased risks of leukemia, other cancers, stillbirth, low birth weight, prematurity, or other congenital anomalies in the RNs' offspring were noted. Conclusions Female RNs having had potential exposure to antineoplastic drugs were not found to have an excess risk of leukemia, stillbirth, or congenital

  15. Surface wipe sampling for antineoplastic (chemotherapy) and other hazardous drug residue in healthcare settings: Methodology and recommendations.

    Science.gov (United States)

    Connor, Thomas H; Zock, Matthew D; Snow, Amy H

    2016-09-01

    Surface wipe sampling for various hazardous agents has been employed in many occupational settings over the years for various reasons such as evaluation of potential dermal exposure and health risk, source determination, quality or cleanliness, compliance, and others. Wipe sampling for surface residue of antineoplastic and other hazardous drugs in healthcare settings is currently the method of choice to determine surface contamination of the workplace with these drugs. The purpose of this article is to review published studies of wipe sampling for antineoplastic and other hazardous drugs, to summarize the methods in use by various organizations and researchers, and to provide some basic guidance for conducting surface wipe sampling for these drugs in healthcare settings.  Recommendations on wipe sampling methodology from several government agencies and organizations were reviewed. Published reports on wipe sampling for hazardous drugs in numerous studies were also examined. The critical elements of a wipe sampling program and related limitations were reviewed and summarized.  Recommendations and guidance are presented concerning the purposes of wipe sampling for antineoplastic and other hazardous drugs in the healthcare setting, technical factors and variables, sampling strategy, materials required, and limitations. The reporting and interpretation of wipe sample results is also discussed.  It is recommended that all healthcare settings where antineoplastic and other hazardous drugs are handled consider wipe sampling as part of a comprehensive hazardous drug "safe handling" program. Although no standards exist for acceptable or allowable surface concentrations for these drugs in the healthcare setting, wipe sampling may be used as a method to characterize potential occupational dermal exposure risk and to evaluate the effectiveness of implemented controls and the overall safety program. A comprehensive safe-handling program for antineoplastic drugs may

  16. Recent Advances on Pathophysiology, Diagnostic and Therapeutic Insights in Cardiac Dysfunction Induced by Antineoplastic Drugs

    Directory of Open Access Journals (Sweden)

    Marilisa Molinaro

    2015-01-01

    Full Text Available Along with the improvement of survival after cancer, cardiotoxicity due to antineoplastic treatments has emerged as a clinically relevant problem. Potential cardiovascular toxicities due to anticancer agents include QT prolongation and arrhythmias, myocardial ischemia and infarction, hypertension and/or thromboembolism, left ventricular (LV dysfunction, and heart failure (HF. The latter is variable in severity, may be reversible or irreversible, and can occur soon after or as a delayed consequence of anticancer treatments. In the last decade recent advances have emerged in clinical and pathophysiological aspects of LV dysfunction induced by the most widely used anticancer drugs. In particular, early, sensitive markers of cardiac dysfunction that can predict this form of cardiomyopathy before ejection fraction (EF is reduced are becoming increasingly important, along with novel therapeutic and cardioprotective strategies, in the attempt of protecting cardiooncologic patients from the development of congestive heart failure.

  17. Bioactive substances with anti-neoplastic efficacy from marine invertebrates: Porifera and Coelenterata

    Directory of Open Access Journals (Sweden)

    Peter Sima

    2011-01-01

    Full Text Available An ever increasing demand for new lead compounds in the pharmaceutical industry has led scientists to search for natural bioactive products. Based on this extensive research, marine invertebrates now represent a rich source of novel substances with significant anti-neoplastic activities. As the current approach of synthesizing new and chemically modifying old drugs seems to have slowed down, and the identification of new anticancer drugs is not too promising, a new approach is clearly needed. The objective of this review is to present up-to-date data on these newer compounds. Based on the data summarized in this short review, it is clear that marine invertebrates represent an extremely important source of compounds with potential anti-cancer effects. Considering that we tested only a tiny number of Porifera and Coelenterata, the best is yet to come.

  18. Bioactive substances with anti-neoplastic efficacy from marine invertebrates: Porifera and Coelenterata.

    Science.gov (United States)

    Sima, Peter; Vetvicka, Vaclav

    2011-11-10

    An ever increasing demand for new lead compounds in the pharmaceutical industry has led scientists to search for natural bioactive products. Based on this extensive research, marine invertebrates now represent a rich source of novel substances with significant anti-neoplastic activities. As the current approach of synthesizing new and chemically modifying old drugs seems to have slowed down, and the identification of new anticancer drugs is not too promising, a new approach is clearly needed. The objective of this review is to present up-to-date data on these newer compounds. Based on the data summarized in this short review, it is clear that marine invertebrates represent an extremely important source of compounds with potential anti-cancer effects. Considering that we tested only a tiny number of Porifera and Coelenterata, the best is yet to come. PMID:22087433

  19. Peroxisome Proliferator-Activated Receptors (PPARs as Potential Inducers of Antineoplastic Effects in CNS Tumors

    Directory of Open Access Journals (Sweden)

    Lars Tatenhorst

    2008-01-01

    Full Text Available The peroxisome proliferator-activated receptors (PPARs are ligand-inducible transcription factors which belong to the superfamily of nuclear hormone receptors. In recent years it turned out that natural as well as synthetic PPAR agonists exhibit profound antineoplastic as well as redifferentiation effects in tumors of the central nervous system (CNS. The molecular understanding of the underlying mechanisms is still emerging, with partially controverse findings reported by a number of studies dealing with the influence of PPARs on treatment of tumor cells in vitro. Remarkably, studies examining the effects of these drugs in vivo are just beginning to emerge. However, the agonists of PPARs, in particular the thiazolidinediones, seem to be promising candidates for new approaches in human CNS tumor therapy.

  20. Drug lag for antineoplastic and immunomodulating agent approvals in India compared with the US and EU approvals

    OpenAIRE

    Bhaven C. Kataria; Ashna S. Pandya; Ashwin K. Panchasara; Pavan J. Panchal; Mitul R. Parmar

    2016-01-01

    Background: There is a tremendous amount of research being conducted on development of new drugs for cancer therapies. The drug development of cancer therapies has dramatically increased over the past few decades. The present study was undertaken to assess the drug lag for new antineoplastic and immunomodulating agents in India compared with that in the United States (US) or European Union (EU). Methods: The new drugs approved in the US, EU and India between 2011 and 2015 were identified a...

  1. Oxidative Stress Induced in Nurses by Exposure to Preparation and Handling of Antineoplastic Drugs in Mexican Hospitals: A Multicentric Study

    OpenAIRE

    Leobardo Manuel Gómez-Oliván; Gerardo Daniel Miranda-Mendoza; Paula Anel Cabrera-Galeana; Marcela Galar-Martínez; Hariz Islas-Flores; Nely SanJuan-Reyes; Nadia Neri-Cruz; Sandra García-Medina

    2014-01-01

    The impact of involuntary exposure to antineoplastic drugs (AD) was studied in a group of nurses in diverse hospitals in Mexico. The results were compared with a group of unexposed nurses. Anthropometric characteristics and the biochemical analysis were analyzed in both groups. Also, lipid peroxidation level (LPX), protein carbonyl content (PCC), and activity of the antioxidant enzymes superoxide dismutase (SOD), catalase (CAT), and glutathione peroxidase (GPx) were evaluated in blood of stud...

  2. Multifactorial analysis of effects of interactions among antifungal and antineoplastic drugs on inhibition of Candida albicans growth.

    OpenAIRE

    Ghannoum, M. A.; Motawy, M S; Abu Hatab, M A; Ibrahim, A.S.; Criddle, R. S.

    1989-01-01

    Interactions among antineoplastic and antifungal drugs affecting the inhibition of Candida albicans growth are complex functions of the nature of the drugs used in combination, their absolute concentrations, and also their relative concentrations. Studies of drug interactions involving the use of test drugs in fixed concentration ratios can lead to inaccurate conclusions about synergism or antagonism among the drugs. A multifactorial experimental design procedure in which the concentrations o...

  3. Identification of Knowledge Gaps Regarding Healthcare Workers' Exposure to Antineoplastic Drugs: Review of Literature, North America versus Europe

    OpenAIRE

    Hon, Chun-Yip; Barzan, Cris; Astrakianakis, George

    2014-01-01

    We have been examining the issue of healthcare workers' exposure to antineoplastic drugs for nearly a decade and have observed that there appears to be more publications on the subject matter originating from Europe than from North America. The concern is that findings from Europe may not be generalizable to North America because of differences in handling practices, regulatory requirements, and training. Our objective was to perform a literature review to confirm our observation and, in turn...

  4. Inhibition of basal and TGF beta-induced fibroblast collagen synthesis by antineoplastic agents. Implications for wound healing.

    OpenAIRE

    Hendricks, T.; Martens, M F; Huyben, C M; Wobbes, T.

    1993-01-01

    Antineoplastic drugs, given in the perioperative period, are thought to be a hazard to wound repair. Since fibroblast collagen synthesis is crucial to healing, we examined the effects of bleomycin, cisplatin and 5-fluorouracil on collagen synthesis in confluent cultures of fibroblasts from human colon and skin. The drugs were added in final concentrations between 0.1 and 50 microM. Bleomycin did not affect collagen synthesis in colon fibroblasts but inhibited synthesis in skin fibroblasts. Co...

  5. High mobility group A1 protein expression reduces the sensitivity of colon and thyroid cancer cells to antineoplastic drugs

    OpenAIRE

    D’Angelo, Daniela; Mussnich, Paula; De Rosa, Roberta; Bianco, Roberto; Tortora, Giampaolo; Fusco, Alfredo

    2014-01-01

    Background Development of resistance to conventional drugs and novel biological agents often impair long-term chemotherapy. HMGA gene overexpression is often associated with antineoplastic drug resistance and reduced survival. Inhibition of HMGA expression in thyroid cancer cells reduces levels of ATM protein, the main cellular sensor of DNA damage, and enhances cellular sensitivity to DNA-damaging agents. HMGA1 overexpression promotes chemoresistance to gemcitabine in pancreatic adenocarcino...

  6. A Comparative Reverse Docking Strategy to Identify Potential Antineoplastic Targets of Tea Functional Components and Binding Mode

    Directory of Open Access Journals (Sweden)

    Rong Zheng

    2011-08-01

    Full Text Available The main functional components of green tea, such as epigallocatechin gallate (EGCG, epigallocatechin (EGC, epicatechin gallate (ECG and epicatechin (EC, are found to have a broad antineoplastic activity. The discovery of their targets plays an important role in revealing the antineoplastic mechanism. Therefore, to identify potential target proteins for tea polyphenols, we have taken a comparative virtual screening approach using two reverse docking systems, one based on Autodock software and the other on Tarfisdock. Two separate in silico workflows were implemented to derive a set of target proteins related to human diseases and ranked by the binding energy score. Several conventional clinically important proteins with anti-tumor effects are screened out from the PDTD protein database as the potential receptors by both procedures. To further analyze the validity of docking results, we study the binding mode of EGCG and the potential target protein Leukotriene A4 hydrolase in detail. We indicate that interactions mediated by electrostatic and hydrogen bond play a key role in ligand binding. EGCG binds to the enzyme with certain orientation and conformation that is suitable for nucleophilic attacks by several electrical residues inside the enzyme’s activity cavity. This study provides useful information for studying the antitumor mechanism of tea’s functional components. The comparative reverse docking strategy presented generates a tractable set of antineoplastic proteins for future experimental validation as drug targets against tumors.

  7. Occupational exposure to antineoplastic agents induces a high level of chromosome damage. Lack of an effect of GST polymorphisms

    International Nuclear Information System (INIS)

    The aim of our study was to investigate whether occupational exposure to antineoplastic drugs (AND) resulted in genetic damage, possibly indicative of adverse health effects in the long term. We performed a chromosomal aberrations (CA) analysis in peripheral blood lymphocytes (PBL) of a group of 76 trained nurses occupationally exposed to AND. Furthermore, we analysed whether genetic polymorphisms in four metabolic genes of the glutathione S-transferase (GST) family involved in antineoplastic drugs detoxification (GSTM1, GSTT1, GSTP1, GSTA1) had any effect on the yield of chromosomal aberrations in nurses exposed to antineoplastic agents. The exposed group showed a very significant increase of genetic damage (p < 0.0001) potentially indicative of an increased risk of cancer. Unexpectedly, besides the elevated level of chromatid-type aberrations usually related to exposure to chemical agents, we found also severe chromosome damages such as chromosome deletions and dicentric chromosomes, usually related to radiation exposure. No significant association was detected between all GSTs genotypes and chromosome damage. In conclusion, our data show how the occupational exposure to AND is associated to a potential cancer risk, suggesting that current prevention methods do not completely eliminate opportunities for exposure and supporting the need to improve the actual safety practices

  8. Reversible posterior leukoencephalopathy syndrome and anti-neoplastic agents: a review

    Directory of Open Access Journals (Sweden)

    Farheen M. Shah-Khan

    2011-12-01

    Full Text Available Reversible Posterior Leukoencephalopathy Syndrome (RPLS is a well recognized entity with a variety of benign and malignant conditions. Recently it has been found to be associated with the use of anti-neoplastic agents including targeted therapies. RPLS occurs rapidly with the use of some drugs and more slowly with others. Combined therapies are associated with a more frequent and more rapid presentation. This review was based on a literature search for English Language articles concerning RPLS and chemotherapeutic agents published from June 1996 to March 2007. We used the PubMed database with keywords: “RPLS”, “Posterior reversible encephalopathy syndrome”, “(PRES”, “Chemotherapy” and “MRI”. This syndrome has classical Clinical-Radiologic features that are easy to recognize. Early recognition and withdrawal of the offending agent is all that is needed in most cases. This review highlights the features of the syndrome. It draws our attention to an entity which is being more frequently recognized and whose exact pathologic mechanisms need to be further studied. This syndrome is associated with the use of neurotoxic as well as non-neurotoxic agents and usually runs a benign course if there is an early diagnosis and management.

  9. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    Energy Technology Data Exchange (ETDEWEB)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Pollak, Michael [Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada); Gotlieb, Walter H., E-mail: walter.gotlieb@mcgill.ca [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada)

    2011-11-04

    Highlights: Black-Right-Pointing-Pointer siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. Black-Right-Pointing-Pointer Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. Black-Right-Pointing-Pointer Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. Black-Right-Pointing-Pointer Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  10. The effect of antineoplastic drugs in a male spontaneous mammary tumor model.

    Directory of Open Access Journals (Sweden)

    Stephanie N Shishido

    Full Text Available Male breast cancer is a rare disease. The limited number of clinical cases has led to the primary treatments for men being derived from female breast cancer studies. Here the transgenic strain FVB/N-Tg(MMTV-PyVT634Mul/J (also known as PyVT was used as a model system for measuring tumor burden and drug sensitivity of the antineoplastic drugs tamoxifen, cisplatin, and paclitaxel on tumorigenesis at an early stage of mammary carcinoma development in a male mouse model. Cisplatin treatment significantly reduced tumor volume, while paclitaxel and tamoxifen did not attenuate tumor growth. Cisplatin treatment was shown to induce apoptosis, grossly observed by reduced tumor formation, through reduced Bcl-2 and survivin protein expression levels with an increase in caspase 3 expression compared to control tumors. Tamoxifen treatment significantly altered the hormone receptor expression levels of the tumor, while additionally upregulating Bcl-2 and Cyclin D1. This suggests an importance in hormonal signaling in male breast cancer pathogenesis. The results of this study provide valuable information toward the better understanding of male breast cancer and may help guide treatment decisions.

  11. New Trends on Antineoplastic Therapy Research: Bullfrog (Rana catesbeiana Shaw) Oil Nanostructured Systems.

    Science.gov (United States)

    Amaral-Machado, Lucas; Xavier-Júnior, Francisco H; Rutckeviski, Renata; Morais, Andreza R V; Alencar, Éverton N; Dantas, Teresa R F; Cruz, Ana K M; Genre, Julieta; da Silva-Junior, Arnóbio A; Pedrosa, Matheus F F; Rocha, Hugo A O; Egito, Eryvaldo S T

    2016-01-01

    Bullfrog oil is a natural product extracted from the Rana catesbeiana Shaw adipose tissue and used in folk medicine for the treatment of several diseases. The aim of this study was to evaluate the extraction process of bullfrog oil, to develop a suitable topical nanoemulsion and to evaluate its efficacy against melanoma cells. The oil samples were obtained by hot and organic solvent extraction processes and were characterized by titration techniques and gas chromatography mass spectrometry (GC-MS). The required hydrophile-lipophile balance and the pseudo-ternary phase diagram (PTPD) were assessed to determine the emulsification ability of the bullfrog oil. The anti-tumoral activity of the samples was assessed by 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay for normal fibroblast (3T3) and melanoma (B16F10) cell lines. Both extraction methods produced yielded around 60% and the oil was mainly composed of unsaturated compounds (around 60%). The bullfrog oil nanoemulsion obtained from PTPD presented a droplet size of about 390 nm and polydispersity = 0.05 and a zeta potential of about -25 mV. Both the bullfrog oil itself and its topical nanoemulsion did not show cytotoxicity in 3T3 linage. However, these systems showed growth inhibition in B16F10 cells. Finally, the bullfrog oil presented itself as a candidate for the development of pharmaceutical products free from cytotoxicity and effective for antineoplastic therapy. PMID:27144557

  12. Sesquiterpene lactones: Mechanism of antineoplastic activity; relationship of cellular glutathione to cytotoxicity; and disposition

    International Nuclear Information System (INIS)

    Helenalin, a sesquiterpene lactone, inhibited the growth of P388 lymphocytic and L1210 lymphoid leukemia, and Ehrlich ascites and KB carcinoma cells. The L1210 leukemia cells were most sensitive to the cytotoxic effects of helenalin. Helenalin's antineoplastic effects were due to inhibition of DNA synthesis by suppressing the activities of enzymes involved in this biosynthetic pathway; i.e., IMP dehydrogenase, ribonucleoside diphosphate reductase, thioredoxin complex, GSH disulfide oxidoreductase and DNA polymerase α activities. The relationship of reduced glutathione (GSH) to the cytotoxic effects of helanalin was evaluated. L1210 cells, which were more sensitive to helenalin's toxicity, contained lower basal concentrations of GSH. Helenalin decreased the concentration of reduced glutathione in both L1210 and P388 leukemia cells. Concurrent administration of helanalin with agents reported to raise GSH concentrations did not substantially effect GSH levels, nor were survival times of tumor-bearing mice enhanced. Following intraperitoneal administration of 3H-plenolin, no radioactive drug and/or metabolite was sequestered in the organs of BDF1 mice. Approximately 50% of 3H-plenolin and/or its metabolites were eliminated via urine while lesser amounts of radioactive drug and/or metabolites were eliminated in the feces

  13. Antineoplastic effects of Rhodiola crenulata treatment on B16-F10 melanoma.

    Science.gov (United States)

    Dudek, Maxine C; Wong, Kaitlyn E; Bassa, Lotfi M; Mora, Maria Carmen; Ser-Dolansky, Jennifer; Henneberry, Jean M; Crisi, Giovanna M; Arenas, Richard B; Schneider, Sallie S

    2015-12-01

    Melanoma is an aggressive form of skin cancer with limited treatment options for advanced stage disease. Early detection and wide surgical excision remain the initial mode of treatment for primary tumors thus preventing metastases and leading to improved prognosis. Through this work, we have evaluated the antineoplastic effects of Rhodiola crenulata (R. crenulata) root extracts on the B16-F10 melanoma cell line, both in vitro and in vivo. We observed that R. crenulata treatment resulted in increased cell death as well as a reduction in tumor cell proliferation and migration in vitro. Additionally, we observed that R. crenulata decreased the expression of integrin β1 and vimentin and increased the expression of E-cadherin. Further, in mice treated with a topical R. crenulata-based cream therapy, tumors were more likely to have a radial growth pattern, a reduction in mitotic activity, and an increase in tumor necrosis. We also observed that mice drinking water supplemented with R. crenulata displayed a reduction of metastatic foci in disseminated models of melanoma. Collectively, these findings suggest that R. crenulata exhibits striking antitumorigenic and antimetastatic properties and that this extract may harbor potential novel adjuvant therapy for the treatment of melanoma. PMID:26159852

  14. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    International Nuclear Information System (INIS)

    Highlights: ► siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. ► Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. ► Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. ► Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  15. Amido analogs of mitoxantrone: physico-chemical properties, molecular modeling, cellular effects and antineoplastic potential.

    Science.gov (United States)

    Zagotto, G; Moro, S; Uriarte, E; Ferrazzi, E; Palù, G; Palumbo, M

    1997-03-01

    To assess the effects of amido substitution in the side-chains of the anticancer drug mitoxantrone (MX) two analogs were synthesized, having hydroxyethylaminoacetyl- and hydroxyethylaminopropionyl- substituents at the nitrogens located at positions 1, 4 of the anthracenedione ring system. The novel derivatives exhibit DNA-affinity and redox properties similar to the parent drug. However, unlike MX, they are not able to stimulate DNA cleavage, as shown by alkaline elution experiments. Molecular modeling studies using ab initio quantum mechanical methods show that, while the stereochemistry of the drug molecule is not appreciably affected when an amide group replaces the aromatic amino function, the reverse is true for the electrostatic properties. Indeed, overlapping of electron density of MX with its analogs is very poor. Moreover, a reversal in the direction of MX dipole moment occurs in the amido congeners. This may explain the lack of recognition of the cleavable topoisomerase II-DNA complex and loss of cleavage stimulation. However, the new derivatives exhibit pharmacological activity comparable to that found for MX, as they are remarkably cytotoxic and are active in vivo against P388 murine leukemia. Hence, amido substitution may lead to a different mechanism of cytotoxicity, not related to classical protein or free radical-mediated DNA damage, which points to a novel type of antineoplastic pharmacophore. PMID:9113065

  16. Characterizing interspecies uncertainty using data from studies of anti-neoplastic agents in animals and humans

    International Nuclear Information System (INIS)

    For most chemicals, the Reference Dose (RfD) is based on data from animal testing. The uncertainty introduced by the use of animal models has been termed interspecies uncertainty. The magnitude of the differences between the toxicity of a chemical in humans and test animals and its uncertainty can be investigated by evaluating the inter-chemical variation in the ratios of the doses associated with similar toxicological endpoints in test animals and humans. This study performs such an evaluation on a data set of 64 anti-neoplastic drugs. The data set provides matched responses in humans and four species of test animals: mice, rats, monkeys, and dogs. While the data have a number of limitations, the data show that when the drugs are evaluated on a body weight basis: 1) toxicity generally increases with a species' body weight; however, humans are not always more sensitive than test animals; 2) the animal to human dose ratios were less than 10 for most, but not all, drugs; 3) the current practice of using data from multiple species when setting RfDs lowers the probability of having a large value for the ratio. These findings provide insight into inter-chemical variation in animal to human extrapolations and suggest the need for additional collection and analysis of matched toxicity data in humans and test animals

  17. A preliminary analysis of antineoplastic activity of parvovirus MVMp NS—1 proteins

    Institute of Scientific and Technical Information of China (English)

    SHENXIZHONG; HSIAOCHIENTSUNG; 等

    1997-01-01

    Human gastric cancer MKN-45 cells were transfected with pULB 3238,a plasmid carrying MVMp MS-1 gene with its original P4 promoter replaced by the glucocorticoid inducible promoter MMTV-LTR.After the integration and expression of NS-1 gene,some of the transfectants died,while others remained alive,but the growth features of survived cells were changed.For further study on the antineoplastic function of parvoviral NS-1 protein in vivo,transgenic mice carrying NS-1 genes were established by conventional method.Among 4 founders,one of them was found to be able to transmit the transgene to around 50% of their offsprings.RT-PCR was performed to indicate the expression of NS-1 gene in transgenic mice and its mRNA appeared in a variety of tissues.The expression of integrated NS-1 gene may correlate with the decreased incidence of tumor induced in vivo by chemical carcinogens.

  18. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  19. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  20. The husk fiber of Cocos nucifera L. (Palmae is a source of anti-neoplastic activity

    Directory of Open Access Journals (Sweden)

    P.R. Koschek

    2007-10-01

    Full Text Available In the present study, we investigated the in vitro anti-tumoral activities of fractions from aqueous extracts of the husk fiber of the typical A and common varieties of Cocos nucifera (Palmae. Cytotoxicity against leukemia cells was determined by the 3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyltetrazolium bromide (MTT assay. Cells (2 x 104/well were incubated with 0, 5, 50 or 500 µg/mL high- or low-molecular weight fractions for 48 h, treated with MTT and absorbance was measured with an ELISA reader. The results showed that both varieties have almost similar antitumoral activity against the leukemia cell line K562 (60.1 ± 8.5 and 47.5 ± 11.9% for the typical A and common varieties, respectively. Separation of the crude extracts with Amicon membranes yielded fractions with molecular weights ranging in size from 1-3 kDa (fraction A to 3-10 kDa (fraction B and to more than 10 kDa (fraction C. Cells were treated with 500 µg/mL of these fractions and cytotoxicity was evaluated by MTT. Fractions ranging in molecular weight from 1-10 kDa had higher cytotoxicity. Interestingly, C. nucifera extracts were also active against Lucena 1, a multidrug-resistant leukemia cell line. Their cytotoxicity against this cell line was about 50% (51.9 ± 3.2 and 56.3 ± 2.9 for varieties typical A and common, respectively. Since the common C. nucifera variety is extensively cultured in Brazil and the husk fiber is its industrial by-product, the results obtained in the present study suggest that it might be a very inexpensive source of new antineoplastic and anti-multidrug resistant drugs that warrants further investigation.

  1. Chemomodulation of human dendritic cell function by antineoplastic agents in low noncytotoxic concentrations

    Directory of Open Access Journals (Sweden)

    Tourkova Irina L

    2009-07-01

    Full Text Available Abstract The dose-delivery schedule of conventional chemotherapy, which determines its efficacy and toxicity, is based on the maximum tolerated dose. This strategy has lead to cure and disease control in a significant number of patients but is associated with significant short-term and long-term toxicity. Recent data demonstrate that moderately low-dose chemotherapy may be efficiently combined with immunotherapy, particularly with dendritic cell (DC vaccines, to improve the overall therapeutic efficacy. However, the direct effects of low and ultra-low concentrations on DCs are still unknown. Here we characterized the effects of low noncytotoxic concentrations of different classes of chemotherapeutic agents on human DCs in vitro. DCs treated with antimicrotubule agents vincristine, vinblastine, and paclitaxel or with antimetabolites 5-aza-2-deoxycytidine and methotrexate, showed increased expression of CD83 and CD40 molecules. Expression of CD80 on DCs was also stimulated by vinblastine, paclitaxel, azacytidine, methotrexate, and mitomycin C used in low nontoxic concentrations. Furthermore, 5-aza-2-deoxycytidine, methotrexate, and mitomycin C increased the ability of human DCs to stimulate proliferation of allogeneic T lymphocytes. Thus, our data demonstrate for the first time that in low noncytotoxic concentrations chemotherapeutic agents do not induce apoptosis of DCs, but directly enhance DC maturation and function. This suggests that modulation of human DCs by noncytotoxic concentrations of antineoplastic drugs, i.e. chemomodulation, might represent a novel approach for up-regulation of functional activity of resident DCs in the tumor microenvironment or improving the efficacy of DCs prepared ex vivo for subsequent vaccinations.

  2. Somatostatin Enhances the Antineoplastic Effects of Tamoxifen on Breast Carcinoma in Vitro

    Institute of Scientific and Technical Information of China (English)

    ZENGXizhi; YAOZhenxiang

    2002-01-01

    Objective:To study the antineoplastic effects of tamoxifen(TAM) in combination with a somatostain analogue(octreotide,OCT) on breast cancer.Methods:Estrogen receptor(ER)-positive(MCF-7) and ER-negative(MDA-MB-435S)human breast carcinoma cell lines were treated with TAM or OCT,or combination of both agents in vitro.Cell proliferation was evaluated by MTT assay,distribu-tion of cell cycle and rate of apoptosis were detemined by flow cytometry.Results:The inhibitory effect of OCT or TAM on proliferation of MCF-7 cells was associated with cell arrest in G0/G1 phase and induction of apoptosis.The inhibitory effect on proliferation of MCF-7 cells enhanced when treatment of TAM combined with OCT.The increased rate of apoptosis induced by combination of TAM and OCT was much higher than use of either TAM or OCT alone.TAM or OCT also had weak inhibitory effect on MDA-MB435S cell.The cells were arrested at S phase by TAM and at G0/G1 phase by OCT, but the induction of apoptosis was not identified.However,the rate of apoptosis was 22.7% if combined treatment of TAM and OCT applied.Conclusion:TAM and OCT can synergistically inhibit proliferation and induce apoptosis of ER-positive and ER-negative breast cancer cells.The synergism of TAM and OCT may be of interest in the clinical treatment of breast carcinoma.

  3. Radiobiological studies on the importance of tumor oxygenation for anti-neoplastic therapy

    International Nuclear Information System (INIS)

    The aim of the twelve studies included in the present thesis was to determine the importance of hypoxia for various anti-neoplastic treatment modalities, and to evaluate possible ways of overcoming the hypoxia problem by combined modality therapy. The murine tumor systems were the C3H mammary carcinoma with 5-12% hypoxic cells, and the SCCVII squamous cell carcinoma with 2% hypoxic cells. The radiation response was significantly improved by the use of hypoxic cell radiosensitizers such as nimorazole or misonidazole, or by allowing the mice to breathe oxygen or carbogen during irradiation. In contrast, the radiation response was significantly impaired by carbon monoxide breathing at a level comparable to what has been observed in heavy smokers. The clamped TCD50 assay was used to classify cancer chemotherapeutic drugs according to their preferential cytotoxicity towards the different tumor subpopulations. Methotrexate had no effect on hypoxic cells and was only borderline toxic towards aerobic cells. Three drugs had significant effect against oxic cells only (5-fluorouracil, bleomycin and cisplatin). Similarly, three drugs were toxic towards hypoxic cells only (etoposide, carmustine, and mitomycin c). Three drugs were effective towards both cell types (vincristine, adriamycin, cyclophosphamide). Hypoxic cells in areas with insufficient blood supply, poor nutrition and increased acidity is known to be highly sensitive to hyperthermia. In a study where cisplatin, heat and x-rays were given together, the local tumor control was not improved when compared to radiation + heat, apparently due to a lack of enhancement in the killing of hypoxic cells. These studies have demonstrated the influence of tumor oxygenation on tumor response to treatment with drugs, hyperthermia and irradiation. New strategies targeted also against perfusion-limited hypoxia is needed. One of the most important conclusions from the present thesis can be implemented without expensive trials or

  4. Evaluation of an oral preventive protocol in children with acute lymphoblastic leukemia Avaliação de um protocolo preventivo oral em crianças com leucemia linfoblástica aguda

    OpenAIRE

    Edja Maria Melo de Brito Costa; Maria Zélia Fernandes; Lêda Bezerra Quinderé; Lélia Batista de Souza; Leão Pereira Pinto

    2003-01-01

    This study was designed to assess the effectiveness of a preventive oral protocol in children receiving antineoplastic treatment for acute lymphoblastic leukemia (ALL) before initiating a larger intervention study. During a seven month period, fourteen children from two to ten years old with a diagnosis of ALL were evaluated. Patients with ALL who received a 0.12% chlorhexidine mouth rinse (seven children) were compared to a control group of patients who were not given the same preventive tre...

  5. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...

  7. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  8. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  9. Efficient decentralized consensus protocols

    Science.gov (United States)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  10. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    Directory of Open Access Journals (Sweden)

    Reza Heidari

    2016-03-01

    Full Text Available Taurine (2-aminoethane sulfonic acid is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotective properties of taurine and glycine against antineoplastic drugs-induced hepatic injury in an ex vivo model of isolated perfused rat liver. Rat liver was perfused with different concentration (10 μM, 100 μM and 1000 μM of antineoplastic drugs (Mitoxantrone, Cyclophosphamide, Cisplatin, 5 Fluorouracil, Doxorubicin and Dacarbazine via portal vein. Taurine and glycine were administered to drug-treated livers and liver perfusate samples were collected for biochemical measurements (ALT, LDH, AST, and K+. Markers of oxidative stress (reactive oxygen species formation, lipid peroxidation, total antioxidant capacity and glutathione were also assessed in liver tissue. Antineoplastic drugs caused significant pathological changes in perfusate biochemistry. Furthermore, markers of oxidative stress were significantly elevated in drug treated livers. It was found that taurine (5 and 10 mM and glycine (5 and 10 mM administration significantly mitigated the biomarkers of liver injury and attenuated drug induced oxidative stress. Our data indicate that taurine and glycine supplementation might help as potential therapeutic options to encounter anticancer drugs-induced liver injury.

  11. Postulating a dermal pathway for exposure to anti-neoplastic drugs among hospital workers. Applying a conceptual model to the results of three workplace surveys

    NARCIS (Netherlands)

    Kromhout, H.; Hoek, F.; Uitterhoeve, R.; Huijbers, R.; Overmars, R.F.; Anzion, R.; Vermeulen, R.

    2000-01-01

    Dermal exposure to anti-neoplastic drugs has been suggested as a potentially important route of exposure of hospital workers. Three small-scale workplace surveys were carried out in several hospitals focusing on contamination by leakage from IV infusion systems; contamination by spilled urine of pat

  12. Simultaneous detection of three antineoplastic drugs on gloves by liquid chromatography with diode array detector

    Directory of Open Access Journals (Sweden)

    Adélia Maria Pimenta de Pádua Alcântara

    2010-12-01

    Full Text Available The aim of this study was to develop a method for simultaneous detection of antineoplastic drugs on gloves since, in occupational exposure, the main contamination route is through dermal contact, which may occur via prolonged contact with contaminated surfaces or materials. The assay was performed by liquid chromatography using the following conditions for the detection of 5-fluorouracil (5-FU, methotrexate (MTX and paclitaxel (TAX: diode array detection and UV quantification at 195 nm for TAX, at 265 nm for 5-FU and at 302 nm for MTX; ODS column (250 x 4 mm, 5 μm with a similar guard column; mobile phase consisted of water (pH 4-methanol-acetonitrile (35:15:50, v/v/v with a flow rate of 1 mL min-1. The method presented a linear range from 0.25 to 20 μg mL-1 with r² higher than 0.99. Repeatability was 0.25 μg mL-1 in samples, although detection was possible in samples that presented values of around 0.1 μg mL-1. The results obtained suggest that the method developed can be applied for the simultaneous determination of the drugs studied and can be considered useful in exposure assessment for health care workers.O objetivo deste estudo foi desenvolver um método para a detecção simultânea de antineoplásicos em luvas, uma vez que, em exposições ocupacionais, a principal via de introdução é a dérmica, por meio de contato prolongado com superfícies e/ou materiais contaminados com tais fármacos. A tecnica de detecção utilizada foi a cromatografia líquida de alta eficiência, com detector de aranjo de diodos, nas seguintes condições: para a detecção de 5-fluorouracila (5-FU, metotrexato (MTX e paclitaxel (TAX: detecção e quantificação de TAX a 195 nm, de 5-FU a 265 nm e de MTX a 302 nm; coluna ODS (250 x 4 mm, 5 μm, com pré-coluna similar; fase móvel constituída de água (pH 4-metanol-acetonitrila (35:15:50, v/v/v, na vazão de 1 mL min-1. O método apresentou uma faixa linear de 0,25-20 mg mL-1, com r² > 0,99. O desvio

  13. Block Advertisement Protocol

    OpenAIRE

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  14. Security of RFID protocols

    OpenAIRE

    van Deursen, Ton

    2011-01-01

    Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power source make RFID tags useful in many applications, but also impose a strong need for secure RFID protocols. The first part of this thesis considers the analysis of untraceability of RFID protocols. We start by designing a formal syntax and semantics for security protocols. We define untraceab...

  15. "Counterfactual" quantum protocols

    OpenAIRE

    Vaidman, Lev

    2016-01-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of `counterfactuality' is offered and it is argued that an interaction-free measurement of the presence of an opaque object can be named `counterfactual', while proposed "counterfactual" measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols...

  16. An Experience with Managing Cancer Patients Reportedly Previously Informed of the Absence of Additional Available Antineoplastic Therapeutic Options

    Directory of Open Access Journals (Sweden)

    George River

    2014-09-01

    Full Text Available Over the past 5 years, a small group of cancer patients who stated their physicians had determined there were no additional available antineoplastic therapeutic options (including potential investigational strategies were seen for a ‘second opinion' in a cancer hospital-based oncology program and subsequently experienced what can reasonably be characterized as having achieved meaningful ‘clinical benefit' (functioning at a fairly high level for a minimum 1 year in the work, home, and/or family environments following the further delivery of a variety of treatment approaches. While recognized to be limited (or even simply ‘anecdotal', this experience emphasizes several clinically relevant conclusions, including the overall utility of a ‘second-opinion' strategy and the potential that the reported statement of an individual practitioner or cancer program that all rational options have been attempted may be inaccurate.

  17. Relation between DNA damage measured by comet assay and OGG1 Ser326Cys polymorphism in antineoplastic drugs biomonitoring

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-09-01

    Full Text Available Antineoplastic drugs are hazardous chemical agents used mostly in the treatment of patients with cancer, however health professionals that handle and administer these drugs can become exposed and develop DNA damage. Comet assay is a standard method for assessing DNA damage in human biomonitoring and, combined with formamidopyrimidine DNA glycosylase (FPG enzyme, it specifically detects DNA oxidative damage. The aim of this study was to investigate genotoxic effects in workers occupationally exposed to cytostatics (n = 46, as compared to a control group with no exposure (n = 46 at two Portuguese hospitals, by means of the alkaline comet assay. The potential of the OGG1 Ser326Cys polymorphism as a susceptibility biomarker was also investigated. Exposure was evaluated by investigating the contamination of surfaces and genotoxic assessment was done by alkaline comet assay in peripheral blood lymphocytes. OGG1 Ser326Cys (rs1052133 polymorphism was studied by Real Time PCR. As for exposure assessment, there were 121 (37% positive samples out of a total of 327 samples analysed from both hospitals. No statistically significant differences (Mann-Whitney test, p > 0.05 were found between subjects with and without exposure, regarding DNA damage and oxidative DNA damage, nevertheless the exposed group exhibited higher values. Moreover, there was no consistent trend regarding the variation of both biomarkers as assessed by comet assay with OGG1 polymorphism. Our study was not statistically significant regarding occupational exposure to antineoplastic drugs and genetic damage assessed by comet assay. However, health professionals should be monitored for risk behaviour, in order to ensure that safety measures are applied and protection devices are used correctly.

  18. Relation between DNA damage measured by comet assay and OGG1 Ser326Cys polymorphism in antineoplastic drugs biomonitoring

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-09-01

    Full Text Available Antineoplastic drugs are hazardous chemical agents used mostly in the treatment of patients with cancer, however health professionals that handle and administer these drugs can become exposed and develop DNA damage. Comet assay is a standard method for assessing DNA damage in human biomonitoring and, combined with formamidopyrimidine DNA glycosylase (FPG enzyme, it specifically detects DNA oxidative damage.The aim of this study was to investigate genotoxic effects in workers occupationally exposed to cytostatics (n = 46, as compared to a control group with no exposure (n = 46 at two Portuguese hospitals, by means of the alkaline comet assay. The potential of the OGG1 Ser326Cys polymorphism as a susceptibility biomarker was also investigated. Exposure was evaluated by investigating the contamination of surfaces and genotoxic assessment was done by alkaline comet assay in peripheral blood lymphocytes. OGG1 Ser326Cys (rs1052133 polymorphism was studied by Real Time PCR.As for exposure assessment, there were 121 (37% positive samples out of a total of 327 samples analysed from both hospitals. No statistically significant differences (Mann-Whitney test, p > 0.05 were found between subjects with and without exposure, regarding DNA damage and oxidative DNA damage, nevertheless the exposed group exhibited higher values. Moreover, there was no consistent trend regarding the variation of both biomarkers as assessed by comet assay with OGG1 polymorphism.Our study was not statistically significant regarding occupational exposure to antineoplastic drugs and genetic damage assessed by comet assay. However, health professionals should be monitored for risk behaviour, in order to ensure that safety measures are applied and protection devices are used correctly.

  19. Use of a radiometric system to screen for antineoplastic agents: correlation with a human tumor cloning system

    International Nuclear Information System (INIS)

    A rapid, semiautomated radiometric system is described for screening for new antineoplastic agents. This radiometric system utilizes inhibition of conversion of [14C]glucose to 14CO2 as an index of cytotoxicity. In this study the radiometric system (BACTEC 460) was first optimized using a variety of human and animal tumor cell lines. Overall, there was a clear linear relationship between the number of cells seeded and the production of 14CO2 from [14C]glucose. The BACTEC System easily detected antitumor activity of compounds from all four classes of antineoplastic agents (doxorubicin, vinblastine, cis-platinum, and methotrexate.) Human tumor cell lines were used to compare the antitumor activity of the same four agents measured by the BACTEC System versus the antitumor activity of the same agents measured by a conventional cloning system. For all cell lines tested there was good agreement in comparison of percentage of survival measured by the BACTEC System versus the standard cloning system. This agreement was better for a continuous exposure to drug in both systems (r = 87, P = less than 0.001) than for a 1-h exposure to the drug (r = 0.35, P = 0.036). In addition to determining the effect of drugs on tumor cells, the BACTEC System was successfully utilized to determine the cytotoxic effect on normal bone marrow buffy coat cells. By utilizing a comparison of suppression of 14CO2 production by normal versus tumor cells, a measurement of differential cytotoxicity could be made. Based on these findings, the radiometric BACTEC System represents a simple and rapid method to detect cytostatic or cytocidal activity of new compounds. It is ideal for use as a prescreen for testing a large number of new chemical entities against a large number of human tumor cell lines

  20. Antineoplastic Effect of Calcium Channel Blocker-Verapamil and 5-Fluorouracil Intraperitoneal Chemotherapy on Hepatocarcinoma-Bearing Rats

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Objective To study the antineoplastic effect of the calcium channel blocker verapamil and 5-fluorouracil intraperitoneal chemotherapy on hepatocarcinoma-bearing rats,and examine the action between calcium channel blockers and cytotoxic drugs. Methods We adopted the method of subcapsular implantation of carcinoma tissues of walker-256 in the left liver lobe as a model of liver carcinoma-bearing rats.All experimental animals were divided into four groups.On the sixth day post implantation,in group A (control group) 6ml of saline was injected intraperitoneally once a day for 3 days.In group B(single chemotherapy group) 6ml of 5-Fu 75 mg/kg was injected intraperitoneally once a day for 3 days.In group C(combination of treatment group)both 5-Fu(75mg/kg) and verapamil (25mg/kg) were administered simultaneously as in A and B.In group D(simple verapamil group)only 6ml of verapamil(25mg/kg)was administered as above. Results Compared with groups A, B and D,The volume of cancer and the contents of liver cancer DNA and protein were significantly reduced.The rates of inhibiting cancer(89.9% in group C and 35.4% in group B)were significantly increased in groupC. Group C had significantly long survival time compared to groups A, B and D(P<0.05).By light microscopy, a number of focal necroses were found in cancer tissue in group C.Conclusion Calcium channel blockers can enhance the antineoplastic effect of 5-Fu intraperitonea chemotherapy to liver cancer;The use of verapamil can not increase the toxicity of 5-Fu.

  1. Commemoration of Montreal Protocol

    OpenAIRE

    CUCULEANU Georgeta

    2008-01-01

    The paper presents the main provisions of the Convention from Vienna for the Protection of the Ozone Layer, the 1987 Montreal Protocol on Substances that deplete the Ozone Layer and its Amendments. The restricting and banning programmes of these substances, some consequences on the environment of the absence of the Protocol and some alternative substances are also presented.

  2. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two...

  3. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  4. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  5. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  6. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification....... In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  7. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  8. Village Level Protocol

    OpenAIRE

    Ankur Dumka

    2014-01-01

    Here in this paper we have proposed for a protocol to be implemented at the village level. As at the village level as there are few agencies to be contacted at village level so this uses a local label addressing of 4 bits to support 16 agencies with 3 bits Time to live header which checks weather a packet is reached or not. Thus being small packet size this protocol is faster and able to support fast network service at village level.

  9. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  10. Frequencies of 23 Functionally Significant Variant Alleles Related with Metabolism of Antineoplastic Drugs in the Chilean Population: Comparison with Caucasian and Asian Populations

    OpenAIRE

    Roco, Ángela; Quiñones, Luis; Agúndez, José A. G.; García-Martín, Elena; Squicciarini, Valentina; Miranda, Carla; Garay, Joselyn; Farfán, Nancy; SAAVEDRA, IVÁN; Cáceres, Dante; Ibarra, Carol; Varela, Nelson

    2012-01-01

    Cancer is a leading cause of death worldwide. The cancer incidence rate in Chile is 133.7/100,000 inhabitants and it is the second cause of death, after cardiovascular diseases. Most of the antineoplastic drugs are metabolized to be detoxified, and some of them to be activated. Genetic polymorphisms of drug-metabolizing enzymes can induce deep changes in enzyme activity, leading to individual variability in drug efficacy and/or toxicity. The present research describes the presence of genetic ...

  11. Frequencies of 23 functionally significant variant alleles related with metabolism of antineoplastic drugs in the Chilean population: comparison with Caucasian and Asian populations

    OpenAIRE

    Angela Margarita Roco; Luis Abel Quiñones; Agúndez, José A. G.; Elena eGarcía-Martín; Valentina eSquicciarini; Carla Estefania Miranda; Joselyn eGaray; Nancy eFarfán; Iván Nicolás Saavedra; Dante Daniel Caceres; Carol eIbarra; Nelson Miguel Varela

    2012-01-01

    Cancer is a leading cause of death worldwide. The cancer incidence rate in Chile is 133.7/100,000 inhabitants and it is the second cause of death, after cardiovascular diseases. Most of the antineoplastic drugs are metabolized to be detoxified, and some of them to be activated. Genetic polymorphisms of drug-metabolizing enzymes can induce deep changes in enzyme activity, leading to individual variability in drug efficacy and/or toxicity. The present research describes the presence of genetic ...

  12. Relation between DNA damage measured by comet assay and OGG1 Ser326Cys polymorphism in antineoplastic drugs biomonitoring

    OpenAIRE

    Carina Ladeira; Susana Viegas; Mário Pádua; Elisabete Carolino; Gomes, Manuel C.; Miguel Brito

    2015-01-01

    Antineoplastic drugs are hazardous chemical agents used mostly in the treatment of patients with cancer, however health professionals that handle and administer these drugs can become exposed and develop DNA damage. Comet assay is a standard method for assessing DNA damage in human biomonitoring and, combined with formamidopyrimidine DNA glycosylase (FPG) enzyme, it specifically detects DNA oxidative damage.The aim of this study was to investigate genotoxic effects in workers occupationally e...

  13. Comprehensive Evaluation of the Anti-Angiogenic and Anti-Neoplastic Effects of Endostar on Liver Cancer through Optical Molecular Imaging

    OpenAIRE

    Qian ZHANG; Du, Yang; Xue, Zhenwen; Chi, Chongwei; Jia, Xiaohua; Tian, Jie

    2014-01-01

    Molecular imaging enables non-invasive monitoring of tumor growth, progression, and drug treatment response, and it has become an important tool to promote biological studies in recent years. In this study, we comprehensively evaluated the in vivo anti-angiogenic and anti-neoplastic effects of Endostar on liver cancer based on the optical molecular imaging systems including micro-computer tomography (Micro-CT), bioluminescence molecular imaging (BLI) and fluorescence molecular tomography (FMT...

  14. Chemosensitivity assay in mice prostate tumor: Preliminary report of flow cytometry, DNA fragmentation, ion ratiometric methods of anti-neoplastic drug monitoring

    OpenAIRE

    Kline Richard; Sharma Rakesh

    2004-01-01

    Abstract Flow cytometry, DNA fragmentation, ion ratiomateric analysis and NMR peaks characterized drug chemosensitivity of antineoplastic drugs. Hypotheses were: 1. The chemosensitive effect of different cancer cell lines is characteristic; 2. DNA fragmentation, ion ratiometric analysis suggest apoptosis status of tumor cells. Methods PC-3 cell lines were compared with DU-145, LNCaP cell lines in culture for the [Na]i and [Ca]i ion sensing dyes, cell death, NMR peaks and apoptosis staining fo...

  15. Quantitative Analysis of the Anti-Proliferative Activity of Combinations of Selected Iron-Chelating Agents and Clinically Used Anti-Neoplastic Drugs

    OpenAIRE

    Eliska Potuckova; Hana Jansova; Miloslav Machacek; Anna Vavrova; Pavlina Haskova; Lucie Tichotova; Vera Richardson; Kalinowski, Danuta S.; Richardson, Des R.; Tomas Simunek

    2014-01-01

    Recent studies have demonstrated that several chelators possess marked potential as potent anti-neoplastic drugs and as agents that can ameliorate some of the adverse effects associated with standard chemotherapy. Anti-cancer treatment employs combinations of several drugs that have different mechanisms of action. However, data regarding the potential interactions between iron chelators and established chemotherapeutics are lacking. Using estrogen receptor-positive MCF-7 breast cancer cells, ...

  16. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    OpenAIRE

    Reza Heidari; Akram Jamshidzadeh; Hossein Niknahad; Farshad Safari; Hamdollah Azizi; Narges Abdoli; Mohammad Mehdi Ommati; Forouzan Khodaei; Arastoo Saeedi; Asma Najibi

    2016-01-01

    Taurine (2-aminoethane sulfonic acid) is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid) is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotec...

  17. Efficacy, safety, and lack of interactions with the use of raltegravir in HIV-infected patients undergoing antineoplastic chemotherapy

    Directory of Open Access Journals (Sweden)

    Sara Bañón

    2014-11-01

    Full Text Available Introduction: Concomitant use of combination antiretroviral regimen (cART and cancer chemotherapy is difficult due to complex interactions and increased toxicity. Raltegravir could be an adequate option through its favourable drug-drug interaction profile. Methods: Prospective longitudinal study of HIV patients with cancer, AIDS related or not, undergoing chemotherapy. Patients without resistance or previous failure were switched or initiated raltegravir plus two nucleoside analogues. Plasma trough levels of raltegravir were measured. Results: Overall, 28 patients receiving a raltegravir-based regimen (4 naive with tenofovir-emtricitabine (18 cases or abacavir-lamivudine (10 cases were included. Mean age was 46.2 years (IQR, 39–52.7, and 79% were male. Median time of HIV was 201.7 months, CD4+ nadir was 268 cells/mm3, and 75% had previous AIDS. At the diagnosis of neoplasia, 17 were on protease inhibitors and 4 with efavirenz. Ten patients had a non-HIV-related cancer (three breast, two pancreatic, one Ewing sarcoma, one myeloblastic leukemia, one melanoma, one parotid adenocarcinoma, one lung, and 18 had an HIV-related cancer (nine non-Hodgkin lymphoma, seven Hodgkin disease, two anal. Overall, 43% of patients received more than one line of chemotherapy, including antimetabolites in 12 patients (5-FU, capecitabine, methotrexate, gemcitabine, alkylating agents in 12 cases (ciclophosphamide, iphosphamide, vinca alkaloids in 20 patients (vincristine, vinblastine, vindesine, antitumor antibiotics in 16 cases (adriamycin, cisplatin o carboplatin in six and monoclonal antibodies in six patients (rituximab, trastuzumab, cetuximab. Six patients modified the doses of antineoplastic agents due to toxicity (four neutropenia, not related to raltegravir. During a median follow up of 12.7 patients-year in concomitant therapy, there was only 1 case of virological failure and no patient discontinued raltegravir. Plasma concentrations of raltegravir in eight

  18. T-Bet Mediated Anti-Neoplastic Effects of Dendritic Cell-Cytokine Induced Killer Cells in Vitro

    Directory of Open Access Journals (Sweden)

    Liu Miao

    2012-03-01

    Full Text Available Objective: To investigate the molecular mechanism underlying T-bet mediated anti-neoplastic effects of cytokine induced killer (CIK cells.Methods: Lymphocytes isolated from peripheral blood of leukemic children were induced with γ- interferon (IFN-γ, CD3McAb and interluki-2 (IL-2, and co-cultured with dendritic cells (DCs to generate DC-CIK cells. The morphology and immunophenotype of these cells were determined by a light microscopy and flow cytometry, respectively. IL-2 and IFN-γ levels released by DC-CIK cells were quantified by ELISA. Cytotoxicity of DC-CIK cells against leukemia cell lines was measured by MTT assay. FCM was used to detect CD4+CD25+Treg cells, while RT-PCR and Western blot were used to determine mRNA and protein expressions of Foxp3 and GATA3 in DC-CIK cells treated with T-bet monoclonal antibody.Findings: Induced DC-CIK cells were regular, round and transparent with variable cell volume and cellular aggregation. The main effector cells in this population were CD3+CD8+ cells and CD3+CD56+ cells. We demonstrated a time dependent increase in IL-2 and IFN-γ levels after induction. DC-CIK cells were cytotoxic to B95 cells, Jhhan cells and M07e cells, with the highest cytotoxicity towards B95 cells. Treatment with mouse anti-human T-bet monoclonal antibody resulted in an increase in the proportion of CD4+CD25+Treg cells and elevation of Foxp3 and GATA3 mRNA and protein levels.Conclusion: DC-CIK cells induced with cytokines were strongly cytotoxic towards a number of cancer cell lines. Foxp3 and GATA3 were implicated in the T-bet mediated anti-neoplastic effects of DC-CIK cells via activation of the Th1 pathway and suppression of the Th2 and Treg pathways.

  19. Accelerator mass spectrometry analysis of 14C-oxaliplatin concentrations in biological samples and 14C contents in biological samples and antineoplastic agents

    Science.gov (United States)

    Toyoguchi, Teiko; Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi; Kato, Kazuhiro; Tokanai, Fuyuki

    2015-10-01

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the 14C concentration in 14C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) - AMS system. The calibration curves of 14C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a 14C content of water in three vacuum blood collection tubes and a syringe were measured. 14C was not detected from water in these devices. The mean 14C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of 14C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, 14C contents of the antineoplastic agents were quantitated. 14C contents were different among 10 antineoplastic agents; 14C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  20. Debunking myths of protocol registration

    OpenAIRE

    Chang Stephanie M; Slutsky Jean

    2012-01-01

    Abstract Developing and registering protocols may seem like an added burden to systematic review investigators. This paper discusses benefits of protocol registration and debunks common misperceptions on the barriers of protocol registration. Protocol registration is easy to do, reduces duplication of effort and benefits the review team by preventing later confusion.

  1. Oxidative Stress Induced in Nurses by Exposure to Preparation and Handling of Antineoplastic Drugs in Mexican Hospitals: A Multicentric Study

    Directory of Open Access Journals (Sweden)

    Leobardo Manuel Gómez-Oliván

    2014-01-01

    Full Text Available The impact of involuntary exposure to antineoplastic drugs (AD was studied in a group of nurses in diverse hospitals in Mexico. The results were compared with a group of unexposed nurses. Anthropometric characteristics and the biochemical analysis were analyzed in both groups. Also, lipid peroxidation level (LPX, protein carbonyl content (PCC, and activity of the antioxidant enzymes superoxide dismutase (SOD, catalase (CAT, and glutathione peroxidase (GPx were evaluated in blood of study participants as oxidative stress (OS biomarkers. The group of occupationally exposed (OE nurses consisted of 30 individuals ranging in age from 25 to 35 years. The control group included 30 nurses who were not occupationally exposed to the preparation and handling of AD and whose anthropometric and biochemical characteristics were similar to those of the OE group. All biomarkers evaluated were significantly increased (P<0.5 in OE nurses compared to the control group. Results show that the assessment of OS biomarkers is advisable in order to evaluate exposure to AD in nurses.

  2. Concanavalin A: A potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis for cancer therapeutics

    Energy Technology Data Exchange (ETDEWEB)

    Li, Wen-wen; Yu, Jia-ying; Xu, Huai-long [School of Life Sciences and State Key Laboratory of Oral Diseases, Sichuan University, Chengdu 610064 (China); Bao, Jin-ku, E-mail: jinkubao@yahoo.com [School of Life Sciences and State Key Laboratory of Oral Diseases, Sichuan University, Chengdu 610064 (China)

    2011-10-22

    Highlights: {yields} ConA induces cancer cell death targeting apoptosis and autophagy. {yields} ConA inhibits cancer cell angiogenesis. {yields} ConA is utilized in pre-clinical and clinical trials. -- Abstract: Concanavalin A (ConA), a Ca{sup 2+}/Mn{sup 2+}-dependent and mannose/glucose-binding legume lectin, has drawn a rising attention for its remarkable anti-proliferative and anti-tumor activities to a variety of cancer cells. ConA induces programmed cell death via mitochondria-mediated, P73-Foxo1a-Bim apoptosis and BNIP3-mediated mitochondrial autophagy. Through IKK-NF-{kappa}B-COX-2, SHP-2-MEK-1-ERK, and SHP-2-Ras-ERK anti-angiogenic pathways, ConA would inhibit cancer cell survival. In addition, ConA stimulates cell immunity and generates an immune memory, resisting to the same genotypic tumor. These biological findings shed light on new perspectives of ConA as a potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis in pre-clinical or clinical trials for cancer therapeutics.

  3. The antineoplastic drug flavopiridol reverses memory impairment induced by Amyloid-ß1-42 oligomers in mice.

    Science.gov (United States)

    Leggio, Gian Marco; Catania, Maria Vincenza; Puzzo, Daniela; Spatuzza, Michela; Pellitteri, Rosalia; Gulisano, Walter; Torrisi, Sebastiano Alfio; Giurdanella, Giovanni; Piazza, Cateno; Impellizzeri, Agata Rita; Gozzo, Lucia; Navarria, Andrea; Bucolo, Claudio; Nicoletti, Ferdinando; Palmeri, Agostino; Salomone, Salvatore; Copani, Agata; Caraci, Filippo; Drago, Filippo

    2016-04-01

    The ectopic re-activation of cell cycle in neurons is an early event in the pathogenesis of Alzheimer's disease (AD), which could lead to synaptic failure and ensuing cognitive deficits before frank neuronal death. Cytostatic drugs that act as cyclin-dependent kinase (CDK) inhibitors have been poorly investigated in animal models of AD. In the present study, we examined the effects of flavopiridol, an inhibitor of CDKs currently used as antineoplastic drug, against cell cycle reactivation and memory loss induced by intracerebroventricular injection of Aß1-42 oligomers in CD1 mice. Cycling neurons, scored as NeuN-positive cells expressing cyclin A, were found both in the frontal cortex and in the hippocampus of Aβ-injected mice, paralleling memory deficits. Starting from three days after Aβ injection, flavopiridol (0.5, 1 and 3mg/kg) was intraperitoneally injected daily, for eleven days. Here we show that a treatment with flavopiridol (0.5 and 1mg/kg) was able to rescue the loss of memory induced by Aβ1-42, and to prevent the occurrence of ectopic cell-cycle events in the mouse frontal cortex and hippocampus. This is the first evidence that a cytostatic drug can prevent cognitive deficits in a non-transgenic animal model of AD. PMID:26875816

  4. A Comprehensive Spectroscopic and Computational Investigation to Probe the Interaction of Antineoplastic Drug Nordihydroguaiaretic Acid with Serum Albumins.

    Science.gov (United States)

    Nusrat, Saima; Siddiqi, Mohammad Khursheed; Zaman, Masihuz; Zaidi, Nida; Ajmal, Mohammad Rehan; Alam, Parvez; Qadeer, Atiyatul; Abdelhameed, Ali Saber; Khan, Rizwan Hasan

    2016-01-01

    Exogenous drugs that are used as antidote against chemotheray, inflammation or viral infection, gets absorbed and interacts reversibly to the major serum transport protein i.e. albumins, upon entering the circulatory system. To have a structural guideline in the rational drug designing and in the synthesis of drugs with greater efficacy, the binding mechanism of an antineoplastic and anti-inflammatory drug Nordihydroguaiaretic acid (NDGA) with human and bovine serum albumins (HSA & BSA) were examined by spectroscopic and computational methods. NDGA binds to site II of HSA with binding constant (Kb) ~105 M-1 and free energy (ΔG) ~ -7.5 kcal.mol-1. It also binds at site II of BSA but with lesser binding affinity (Kb) ~105 M-1 and ΔG ~ -6.5 kcal.mol-1. The negative value of ΔG, ΔH and ΔS for both the albumins at three different temperatures confirmed that the complex formation process between albumins and NDGA is spontaneous and exothermic. Furthermore, hydrogen bonds and hydrophobic interactions are the main forces involved in complex formation of NDGA with both the albumins as evaluated from fluorescence and molecular docking results. Binding of NDGA to both the albumins alter the conformation and causes minor change in the secondary structure of proteins as indicated by the CD spectra. PMID:27391941

  5. Concanavalin A: A potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis for cancer therapeutics

    International Nuclear Information System (INIS)

    Highlights: → ConA induces cancer cell death targeting apoptosis and autophagy. → ConA inhibits cancer cell angiogenesis. → ConA is utilized in pre-clinical and clinical trials. -- Abstract: Concanavalin A (ConA), a Ca2+/Mn2+-dependent and mannose/glucose-binding legume lectin, has drawn a rising attention for its remarkable anti-proliferative and anti-tumor activities to a variety of cancer cells. ConA induces programmed cell death via mitochondria-mediated, P73-Foxo1a-Bim apoptosis and BNIP3-mediated mitochondrial autophagy. Through IKK-NF-κB-COX-2, SHP-2-MEK-1-ERK, and SHP-2-Ras-ERK anti-angiogenic pathways, ConA would inhibit cancer cell survival. In addition, ConA stimulates cell immunity and generates an immune memory, resisting to the same genotypic tumor. These biological findings shed light on new perspectives of ConA as a potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis in pre-clinical or clinical trials for cancer therapeutics.

  6. A multicenter study of biological effects assessment of pharmacy workers occupationally exposed to antineoplastic drugs in Pharmacy Intravenous Admixture Services.

    Science.gov (United States)

    Zhang, Jingjing; Bao, Jianan; Wang, Renying; Geng, Zhou; Chen, Yao; Liu, Xinchun; Xie, Yongzhong; Jiang, Ling; Deng, Yufei; Liu, Gaolin; Xu, Rong; Miao, Liyan

    2016-09-01

    This multi-centered study was designed to evaluate the biological effects of exposure to antineoplastic drugs (ADs) at PIVAS (Pharmacy Intravenous Admixture Service) across ten Chinese hospitals. 8-hydroxy-2-deoxyguanosine (8-OHdG) was used as a biomarker of DNA oxidative damage and lymphocyte apoptosis assays using peripheral lymphocyte cells were used to detect primary DNA damage. The mutagenicity activity was estimated with the Ames fluctuation test. 158 exposed and 143 unexposed workers participated in this study. The urinary 8-OHdG/Cr concentrations of the exposed group was 22.05±17.89ng/mg Cr, which was significantly higher than controls of 17.36±13.50ng/mg Cr (P<0.05). The rate of early lymphocyte apoptosis was slightly increased in exposed group than that of the control group (P=0.087). The mutagenic activity was significantly higher in the exposed group relative to the control group (P<0.05). Moreover, while no statistically significant difference was observed, higher concentrations of 8-OHdG/Cr in urine and an early lymphocyte apoptosis rate were found in exposed group II as compared to exposed group I. In addition, a significant correlation between early lymphocyte apoptosis and exposure time to ADs was also observed (P<0.05). In conclusion, our study identified elevated biomarkers in PIVAS workers exposed to ADs. However whether these findings could lead to increased incidence of genotoxic responses remains to be further investigated. PMID:27179702

  7. Diet and tumor LKB1 expression interact to determine sensitivity to anti-neoplastic effects of metformin in vivo.

    Science.gov (United States)

    Algire, C; Amrein, L; Bazile, M; David, S; Zakikhani, M; Pollak, M

    2011-03-10

    Hypothesis-generating epidemiological research has suggested that cancer burden is reduced in diabetics treated with metformin and experimental work has raised questions regarding the role of direct adenosine monophosphate-activated protein kinase (AMPK)-mediated anti-neoplastic effects of metformin as compared with indirect effects attributable to reductions in circulating insulin levels in the host. We treated both tumor LKB1 expression and host diet as variables, and observed that metformin inhibited tumor growth and reduced insulin receptor activation in tumors of mice with diet-induced hyperinsulinemia, independent of tumor LKB1 expression. In the absence of hyperinsulinemia, metformin inhibited only the growth of tumors transfected with short hairpin RNA against LKB1, a finding attributable neither to an effect on host insulin level nor to activation of AMPK within the tumor. Further investigation in vitro showed that cells with reduced LKB1 expression are more sensitive to metformin-induced adenosine triphosphate depletion owing to impaired ability to activate LKB1-AMPK-dependent energy-conservation mechanisms. Thus, loss of function of LKB1 can accelerate proliferation in contexts where it functions as a tumor suppressor, but can also sensitize cells to metformin. These findings predict that any clinical utility of metformin or similar compounds in oncology will be restricted to subpopulations defined by host insulin levels and/or loss of function of LKB1. PMID:21102522

  8. 碱基切除修复与抗肿瘤药物耐药%Base excision repair and antineoplastic drug resistance

    Institute of Scientific and Technical Information of China (English)

    况里杉; 王宇亮; 周向东

    2013-01-01

    Chemotherapy is one of the main methods to treat malignant tumors in clinical practice. Resistance to antineoplastic agents is one of the important reasons for treatment failure. The antineoplastic mechanism of various chemotherapeutic agents is to cause DNA damage, then result in apoptosis of tumor cells. It is suggested that the function of DNA repair is directly associated with the efficacy of antineoplastic agents. Current studies suggest that there are four major DNA repair pathways including BER (base excision repair), NER (nucleotide excision repair), MMR (mismatch repair) and DSBR (double strand break repair). Of these four pathways, BER is one of the main mechanisms of DNA repair and its malfunction is closely related to the resistance to antineoplastic agents. Recently, many kinds of agents and strategies targeting BER have been developed to reverse chemoresistance. This review summarizes the progress in research in this area and discusses the mechanism of resistance to antineoplastic agents and the potential preventive and therapeutic strategies.%化疗是目前临床上治疗肿瘤的主要方法之一,抗肿瘤药物耐药则是导致肿瘤治疗失败的重要原因之一.多种化疗药物抗肿瘤的主要机制是引起DNA损伤,进而导致肿瘤细胞凋亡;因此,DNA修复功能状态与抗肿瘤药物疗效有着直接的关系.目前,已知有4种主要的DNA修复途径:碱基切除修复(base excision repair,BER)、核苷酸切除修复(nucleotide excision repair,NER)、错配修复(mismatch repair,MMR)和双键断裂修复(double strand break repair,DSBR).其中,BER是主要的DNA修复机制之一,其修复功能异常与抗肿瘤药物耐药有着密切的联系.近年来,以BER为靶点开发了多种逆转耐药的药物或方法.本文将简要综述相关的研究进展,深入探讨抗肿瘤药物耐药的发生机制及防治措施.

  9. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  10. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...... end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that...... the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and...

  11. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  13. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  14. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  15. Model Additional Protocol

    International Nuclear Information System (INIS)

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  16. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  17. Parallel screening of FDA-approved antineoplastic drugs for identifying sensitizers of TRAIL-induced apoptosis in cancer cells

    Directory of Open Access Journals (Sweden)

    Taylor David J

    2011-11-01

    Full Text Available Abstract Background Tumor Necrosis Factor-α Related Apoptosis Inducing Ligand (TRAIL and agonistic antibodies to death receptor 4 and 5 are promising candidates for cancer therapy due to their ability to induce apoptosis selectively in a variety of human cancer cells, while demonstrating little cytotoxicity in normal cells. Although TRAIL and agonistic antibodies to DR4 and DR5 are considered safe and promising candidates in cancer therapy, many malignant cells are resistant to DR-mediated, TRAIL-induced apoptosis. In the current work, we screened a small library of fifty-five FDA and foreign-approved anti-neoplastic drugs in order to identify candidates that sensitized resistant prostate and pancreatic cancer cells to TRAIL-induced apoptosis. Methods FDA-approved drugs were screened for their ability to sensitize TRAIL resistant prostate cancer cells to TRAIL using an MTT assay for cell viability. Analysis of variance was used to identify drugs that exhibited synergy with TRAIL. Drugs demonstrating the highest synergy were selected as leads and tested in different prostate and pancreatic cancer cell lines, and one immortalized human pancreatic epithelial cell line. Sequential and simultaneous dosing modalities were investigated and the annexin V/propidium iodide assay, in concert with fluorescence microscopy, was employed to visualize cells undergoing apoptosis. Results Fourteen drugs were identified as having synergy with TRAIL, including those whose TRAIL sensitization activities were previously unknown in either prostate or pancreatic cancer cells or both. Five leads were tested in additional cancer cell lines of which, doxorubicin, mitoxantrone, and mithramycin demonstrated synergy in all lines. In particular, mitoxantrone and mithramycin demonstrated significant synergy with TRAIL and led to reduction of cancer cell viability at concentrations lower than 1 μM. At these low concentrations, mitoxantrone demonstrated selectivity toward

  18. Cell-based laboratory evaluation of coagulation activation by antineoplastic drugs for the treatment of lymphoid tumors

    Science.gov (United States)

    Tsunaka, Misae; Arai, Reina; Ohashi, Ayaka; Koyama, Takatoshi

    2016-01-01

    Objectives: Combining vorinostat, L-asparaginase, and doxorubicin (Dox) led to improved response rates in the treatment of lymphoid tumors. However, deep-vein thrombosis has been noted as one of the most serious side effects with these drugs, and how these regimens cause deep-vein thrombosis is unclear. Methods: We investigated the procoagulant effects of vorinostat, L-asparaginase, and doxorubicin in lymphoid tumors, focusing on tissue factor, phosphatidylserine, and antithrombin. The human vascular endothelial cell line EAhy926 as well as the lymphoid neoplastic cell lines HUT78 (cutaneous T-cell lymphoma), Molt4 (acute T-lymphoblastic leukemia), and Ramos (Burkitt lymphoma) were employed to investigate these procoagulant effects. Results: Vorinostat, L-asparaginase, and doxorubicin induced exposure of phosphatidylserine and procoagulant activity on the surface of lymphoid tumor cells. Vorinostat and doxorubicin also induced phosphatidylserine exposure and increased procoagulant activity on EAhy926 cells. Expression of tissue factor antigen was induced by doxorubicin on the surface of each type of cells, whereas expression of tissue factor mRNA was unchanged. Secretion of antithrombin from HepG2 cells was reduced only by L-asparaginase. Conclusion: These data suggest that vorinostat and doxorubicin may induce procoagulant activity in vessels through apoptosis of tumor cells and through phosphatidylserine exposure and/or tissue factor expression on vascular endothelial cells. L-asparaginase may induce a thrombophilic state by reducing the secretion of anticoagulant proteins such as antithrombin. The laboratory methods described here could be useful to evaluate the procoagulant effects of antineoplastic drugs. PMID:27504186

  19. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  20. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  1. Protocols for Microcontrollers Networks

    OpenAIRE

    López, Ricardo A.

    2011-01-01

    The microcontrollers are embedded in our way of life and are found in many devices. The ability of Very High Scale Integration (VLSI) - with almost exponential growth in recent years makes these devices every day contain functions previously unthinkable. Therefore, a grouping of these networked devices creates a very powerful system, which equipped with a standard protocol that allows interconnection to the Internet gives you a virtually unlimited range of scalability. For these reasons, t...

  2. Seismic protocol urges sensitivity

    International Nuclear Information System (INIS)

    This paper is a preliminary summary of a protocol manual for conducting seismic surveys in various topographic and geographic situations to minimize environmental impacts. The manual aims at addressing unique issues for six different types of ecological environments in such a way as to enhance contractors' overall awareness of the types of environmental issues they may encounter, along with some common sense methods of dealing with them. Those six environments are marine, coastal, rain forest, arctic, semi-level terrains, and mountainous

  3. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  4. MicroRNA-19a/b mediates grape seed procyanidin extract-induced anti-neoplastic effects against lung cancer.

    Science.gov (United States)

    Mao, Jenny T; Xue, Bingye; Smoake, Jane; Lu, Qing-Yi; Park, Heesung; Henning, Susanne M; Burns, Windie; Bernabei, Alvise; Elashoff, David; Serio, Kenneth J; Massie, Larry

    2016-08-01

    Oncomirs are microRNAs (miRNA) associated with carcinogenesis and malignant transformation. They have emerged as potential molecular targets for anti-cancer therapy. We hypothesize that grape seed procyanidin extract (GSE) exerts antineoplastic effects through modulations of oncomirs and their downstream targets. We found that GSE significantly down-regulated oncomirs miR-19a and -19b in a variety of lung neoplastic cells. GSE also increased mRNA and protein levels of insulin-like growth factor II receptor (IGF-2R) and phosphatase and tensin homolog (PTEN), both predicted targets of miR-19a and -19b. Furthermore, GSE significantly increased PTEN activity and decreased AKT phosphorylation in A549 cells. Transfection of miR-19a and -19b mimics reversed the up-regulations of IGF2R and PTEN gene expression and abrogated the GSE induced anti-proliferative response. Additionally, oral administration of leucoselect phytosome, comprised of standardized grape seed oligomeric procyanidins complexed with soy phospholipids, to athymic nude mice via gavage, significantly down-regulated miR-19a, -19b and the miR-17-92 cluster host gene (MIR17HG) expressions, increased IGF-2R, PTEN, decreased phosphorylated-AKT in A549 xenograft tumors, and markedly inhibited tumor growth. To confirm the absorption of orally administered GSE, plasma procyanidin B1 levels, between 60 and 90 min after gavage of leucoselect phytosome (400 mg/kg), were measured by LC/MS at week 2 and 8 of treatment; the estimated concentration that was associated with 50% growth inhibition (IC50) (1.3 μg/mL) in vitro was much higher than the IC50 (0.032-0.13 μg/ml) observed in vivo. Our findings reveal novel antineoplastic mechanisms by GSE and support the clinical translation of leucoselect phytosome as an anti-neoplastic and chemopreventive agent for lung cancer. PMID:27289489

  5. An automatic protocol composition checker

    OpenAIRE

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  6. ET-09DECOY OLIGONUCLEOTIDE DERIVED FROM MGMT ENHANCER HAS AN ANTINEOPLASTIC ACTIVITY IN-VITRO AND IN-VIVO

    Science.gov (United States)

    Canello, Tamar; Ovadia, Haim; Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    INTRODUCTION: Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, correlates with a better therapeutic response and with increased survival. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through binding of p65/NF-kappaB homodimers to the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer. METHODS AND RESULTS: In an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to MGMT enhancer, the potential of the MGMT-kB1-LODN to enhance cell killing was studied in vitro in two glioma cell lines (T98G and U87) and a melanoma cell line (A375P). All three cell lines manifested a significant enhanced cell killing effect following exposure to temozolomide (TMZ) when first transfected with MGMT-kb1-LODN, and also induced a significant cell killing when administered as monotherapy. These results were confirmed also in-vivo on A375P Melanoma xenografts. Intratumoral (Intralesional - IL) injection of MGMT-kB1-LODN with or without IP injection of TMZ induced significant tumor growth inhibition either as a monotherapy or in combination with TMZ. The long-term effect of MGMT-kB1-LODN monotherapy was evaluated using a repetitive IL injection every 4 to 5 days for 55 days with either MGMT-κB1 LODN or control ODN or vehicle. A significant difference (p < 0.01) in tumor volume was obtained by MGMT-κB1-LODN compared to both control groups. Moreover, two out of the seven mice treated with MGMT-κB1-LODN demonstrated tumor regression by day 55 and no tumor recurrence was observed five months later. CONCLUSION: The results of these experiments show that the MGMT-kB1-LODN has a substantial antineoplastic effect when used either in combination with

  7. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  8. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  9. Provenance Query Protocol

    OpenAIRE

    Miles, S.; Moreau, L; Groth, P; Tan, V.; Munroe, S; Jiang, Sheng

    2006-01-01

    A related document defines schemas to be used for documentation about the execution of a process. It also defines the provenance of a data item as the process that led to that item. A provenance query is a query for the provenance of a data item and the results of such a query is documentation of the process that led to the item. In this document, we specify a protocol by which a querying actor and provenance store can communicate in performing a provenance query. This primarily takes the for...

  10. Transfusion protocol in trauma

    Directory of Open Access Journals (Sweden)

    Kaur Paramjit

    2011-01-01

    Full Text Available Blood and blood components are considered drugs because they are used in the treatment of diseases. As with any drug, adverse effects may occur, necessitating careful consideration of therapy. Like any other therapeutic decision, the need for transfusion should be considered on the basis of risks and benefits and alternative treatments available to avoid over- and under-transfusion. This review is focused on the blood transfusion protocol in trauma patients with hemorrhagic shock. Besides, issues related to emergency and massive transfusion have also been elaborated. We conducted a comprehensive MEDLINE search and reviewed the relevant literature, with particular reference to emergency medical care in trauma.

  11. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  12. Formal Verification of Quantum Protocols

    CERN Document Server

    Nagarajan, R; Nagarajan, Rajagopal; Gay, Simon

    2002-01-01

    We propose to analyse quantum protocols by applying formal verification techniques developed in classical computing for the analysis of communicating concurrent systems. One area of successful application of these techniques is that of classical security protocols, exemplified by Lowe's discovery and fix of a flaw in the well-known Needham-Schroeder authentication protocol. Secure quantum cryptographic protocols are also notoriously difficult to design. Quantum cryptography is therefore an interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information processing scenarios. The example we use is the quantum key distribution protocol proposed by Bennett and Brassard, commonly referred to as BB84. We present a model of the protocol in the process calculus CCS and the results of some initial analyses using the Concurrency Workbench of the New Century (CWB-NC).

  13. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  14. Survey protocol for invasive species

    OpenAIRE

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  15. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  16. Mobile Multilayer IPsec protocol

    Directory of Open Access Journals (Sweden)

    T.Gayathri

    2009-08-01

    Full Text Available A mobile user moves around and switches between wireless cells, subnets and domains, it needs to maintain the session continuity. At the same time security of signaling and transport media should not be compromised. A multi-layer security framework involving user authentication, packet based encryption and access control mechanism can provide the desired level of security to the mobile users. Supporting streaming traffic in a mobile wireless Internet is faced with several challenges due to continuous handoff experienced by a mobile user. These challenges include dynamic binding, location management, quality of service and end-to-end security for signaling and transport. Mobile users will use heterogeneous radio access networking technologies. Mobile multilayer IPsec protocol (MML IPSec extends ML-IPSec to deal with mobility and make it suitable for wireless networks. MML-IPSec is integration of ML-IPSec and mobile IP.

  17. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  18. Compiling and securing cryptographic protocols

    CERN Document Server

    Chevalier, Yannick

    2009-01-01

    Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent translation and to reuse many known results from the literature in order to cover more crypto-primitives. In particular this work is the first one to show how to compile protocols parameterised by the properties of the available operations.

  19. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.; Nielson, Hanne Riis; Nielson, Flemming

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  20. Vitamin E succinate is a potent novel antineoplastic agent with high selectivity and cooperativity with tumor necrosis factor-related apoptosis-inducing ligand (Apo2 ligand) in vivo

    Czech Academy of Sciences Publication Activity Database

    Weber, T.; Lu, M.; Anděra, Ladislav; Lahm, H.; Gellert, N.; Fariss, M. W.; Kořínek, Vladimír; Sattler, W.; Ucker, D. S.; Terman, A.; Schroder, A.; Erl, W.; Brunk, U. T.; Coffey, R. J.; Weber, C.; Neuzil, J.

    2002-01-01

    Roč. 8, - (2002), s. 863-869. ISSN 1078-0432 R&D Projects: GA ČR GA312/99/0348 Institutional research plan: CEZ:AV0Z5052915 Keywords : Vitamin E, Antineoplastic Agent, Tumor Necrosis Factor Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 5.991, year: 2002

  1. Quantitative analysis of the anti-proliferative activity of combinations of selected iron-chelating agents and clinically used anti-neoplastic drugs.

    Directory of Open Access Journals (Sweden)

    Eliska Potuckova

    Full Text Available Recent studies have demonstrated that several chelators possess marked potential as potent anti-neoplastic drugs and as agents that can ameliorate some of the adverse effects associated with standard chemotherapy. Anti-cancer treatment employs combinations of several drugs that have different mechanisms of action. However, data regarding the potential interactions between iron chelators and established chemotherapeutics are lacking. Using estrogen receptor-positive MCF-7 breast cancer cells, we explored the combined anti-proliferative potential of four iron chelators, namely: desferrioxamine (DFO, salicylaldehyde isonicotinoyl hydrazone (SIH, (E-N'-[1-(2-hydroxy-5-nitrophenylethyliden] isonicotinoyl hydrazone (NHAPI, and di-2-pyridylketone 4,4-dimethyl-3-thiosemicarbazone (Dp44mT, plus six selected anti-neoplastic drugs. These six agents are used for breast cancer treatment and include: paclitaxel, 5-fluorouracil, doxorubicin, methotrexate, tamoxifen and 4-hydroperoxycyclophosphamide (an active metabolite of cyclophosphamide. Our quantitative chelator-drug analyses were designed according to the Chou-Talalay method for drug combination assessment. All combinations of these agents yielded concentration-dependent, anti-proliferative effects. The hydrophilic siderophore, DFO, imposed antagonism when used in combination with all six anti-tumor agents and this antagonistic effect increased with increasing dose. Conversely, synergistic interactions were observed with combinations of the lipophilic chelators, NHAPI or Dp44mT, with doxorubicin and also the combinations of SIH, NHAPI or Dp44mT with tamoxifen. The combination of Dp44mT with anti-neoplastic agents was further enhanced following formation of its redox-active iron and especially copper complexes. The most potent combinations of Dp44mT and NHAPI with tamoxifen were confirmed as synergistic using another estrogen receptor-expressing breast cancer cell line, T47D, but not estrogen receptor

  2. Quantitative analysis of the anti-proliferative activity of combinations of selected iron-chelating agents and clinically used anti-neoplastic drugs.

    Science.gov (United States)

    Potuckova, Eliska; Jansova, Hana; Machacek, Miloslav; Vavrova, Anna; Haskova, Pavlina; Tichotova, Lucie; Richardson, Vera; Kalinowski, Danuta S; Richardson, Des R; Simunek, Tomas

    2014-01-01

    Recent studies have demonstrated that several chelators possess marked potential as potent anti-neoplastic drugs and as agents that can ameliorate some of the adverse effects associated with standard chemotherapy. Anti-cancer treatment employs combinations of several drugs that have different mechanisms of action. However, data regarding the potential interactions between iron chelators and established chemotherapeutics are lacking. Using estrogen receptor-positive MCF-7 breast cancer cells, we explored the combined anti-proliferative potential of four iron chelators, namely: desferrioxamine (DFO), salicylaldehyde isonicotinoyl hydrazone (SIH), (E)-N'-[1-(2-hydroxy-5-nitrophenyl)ethyliden] isonicotinoyl hydrazone (NHAPI), and di-2-pyridylketone 4,4-dimethyl-3-thiosemicarbazone (Dp44mT), plus six selected anti-neoplastic drugs. These six agents are used for breast cancer treatment and include: paclitaxel, 5-fluorouracil, doxorubicin, methotrexate, tamoxifen and 4-hydroperoxycyclophosphamide (an active metabolite of cyclophosphamide). Our quantitative chelator-drug analyses were designed according to the Chou-Talalay method for drug combination assessment. All combinations of these agents yielded concentration-dependent, anti-proliferative effects. The hydrophilic siderophore, DFO, imposed antagonism when used in combination with all six anti-tumor agents and this antagonistic effect increased with increasing dose. Conversely, synergistic interactions were observed with combinations of the lipophilic chelators, NHAPI or Dp44mT, with doxorubicin and also the combinations of SIH, NHAPI or Dp44mT with tamoxifen. The combination of Dp44mT with anti-neoplastic agents was further enhanced following formation of its redox-active iron and especially copper complexes. The most potent combinations of Dp44mT and NHAPI with tamoxifen were confirmed as synergistic using another estrogen receptor-expressing breast cancer cell line, T47D, but not estrogen receptor-negative MDA

  3. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  4. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  5. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  6. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Directory of Open Access Journals (Sweden)

    Arturo Alejandro Dreifuss

    Full Text Available This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT brute hydroethanolic (BHE extract with those of two fractions derived from it. These fractions are choroformic (CHCl3 and n-butanolic (BuOH, rich in pentacyclic oxindole alkaloids (POA and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1 or its fractions (as per the yield of the fractioning process or vehicle (Control was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  7. Data Link Layer Protocol Simulator User Guide

    OpenAIRE

    Nataf, Emmanuel

    2008-01-01

    The data link layer protocol simulator allows to write protocol and to see them in execution. This guide describes a step by step approach from simple information communication without any control to windows protocols. A protocol oriented java API is defined to write protocol algorithms.

  8. Performance Evaluation of Security Protocols

    CERN Document Server

    Genge, Bela

    2009-01-01

    We propose a comparative performance evaluation of security protocols. The novelty of our approach lies in the use of a polynomial mathematical model that captures the performance of classes of cryptographic algorithms instead of capturing the performance of each algorithm separately, approach that is used in other papers. A major advantage of using such a model is that it does not require implementation-specific information, because the decision is based on comparing the estimated performances of protocols instead of actually evaluating them. The approach is validated by comparatively evaluating the performances of 1000 automatically generated security protocols against the performances of their actual implementations.

  9. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  10. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  11. Assessment of Established Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously prior to 2013 reviewed or approved survey protocol for use as a National or Regional survey...

  12. Automatic Sequencing for Experimental Protocols

    Science.gov (United States)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  13. Kyoto Protocol one step closer

    Science.gov (United States)

    Showstack, Randy

    The European Union (EU) could soon decide to ratify the Kyoto Protocol on climate change, following a 4 March meeting of the European Commissions environment council to approve the treaty.European Commission President Romani Prodi said the council's move enables the 15 EU member states to take the steps toward simultaneous ratification together with the commission before 1 June."I urge our partners both in the developed and in the developing countries to also ratify the Kyoto Protocol soon," he said.

  14. SNOMED CT® Encoded Cancer Protocols

    OpenAIRE

    van Berkum, Monique M.

    2003-01-01

    SNOMED Clinical Terms® (SNOMED CT®) is being used to encode the Cancer Protocols published by the College of American Pathologists (CAP). As of January 1, 2004, one of the standards set for approved cancer programs by the American College of Surgeons Commission on Cancer will be that at least 90% of surgical pathology reports contain all essential data elements identified in the CAP Cancer Protocols.

  15. Neonatal euthanasia: The Groningen Protocol*

    OpenAIRE

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criter...

  16. Secure E-payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2009-11-01

    Full Text Available The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now one of the most centralresearch areas in e-commerce, mainly regarding online and offline paymentscenarios. In this paper, we will discuss an important e-payment protocol namelyKim and Lee scheme examine its advantages and delimitations, whichencourages the author to develop more efficient scheme that keeping allcharacteristics intact without concession of the security robustness of theprotocol. The suggest protocol employs the idea of public key encryption schemeusing the thought of hash chain. We will compare the proposed protocol with Kimand Lee protocol and demonstrate that the proposed protocol offers moresecurity and efficiency, which makes the protocol workable for real worldservices.

  17. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x107 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x107 spleen cells to 1x106 myeloma cells (ratio 10:1). Centrifuge

  18. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  19. Superselection rules and quantum protocols

    International Nuclear Information System (INIS)

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system--in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties--by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules

  20. 21 CFR 1301.18 - Research protocols.

    Science.gov (United States)

    2010-04-01

    ..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to, and... be in lieu of a research protocol to the Administration as required in paragraph (a) of this...

  1. Dexamethasone-(C21-phosphoramide)-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549)

    Science.gov (United States)

    Coyne, Cody P; Narayanan, Lakshmi

    2016-01-01

    Purpose Corticosteroids are effective in the management of a variety of disease states, such as several forms of neoplasia (leukemia and lymphoma), autoimmune conditions, and severe inflammatory responses. Molecular strategies that selectively “target” delivery of corticosteroids minimize or prevents large amounts of the pharmaceutical moiety from passively diffusing into normal healthy cell populations residing within tissues and organ systems. Materials and methods The covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR] was synthesized by reacting dexamethasone-21-monophosphate with a carbodiimide reagent to form a dexamethasone phosphate carbodiimide ester that was subsequently reacted with imidazole to create an amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate. Monoclonal anti-EGFR immunoglobulin was combined with the amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate, resulting in the synthesis of the covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR]. Following spectrophotometric analysis and validation of retained epidermal growth factor receptor type 1 (EGFR)-binding avidity by cell-ELISA, the selective anti-neoplasic cytotoxic potency of dexamethasone-(C21-phosphoramide)-[anti-EGFR] was established by MTT-based vitality stain methodology using adherent monolayer populations of human pulmonary adenocarcinoma (A549) known to overexpress the tropic membrane receptors EGFR and insulin-like growth factor receptor type 1. Results The dexamethasone:IgG molar-incorporation-index for dexamethasone-(C21-phosphoramide)-[anti-EGFR] was 6.95:1 following exhaustive serial microfiltration. Cytotoxicity analysis: covalent bonding of dexamethasone to monoclonal anti-EGFR immunoglobulin did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10

  2. Emergency department radiation accident protocol.

    Science.gov (United States)

    Leonard, R B; Ricks, R C

    1980-09-01

    Every emergency department faces the potential problem of handling one or more victims of a radiation accident. While emergency departments near nuclear power plants or isotope production laboratories probably have a detailed protocol for such emergencies, a similar protocol is needed for the emergency department that may have to handle an isolated event, such as a vehicular accident that spills radioactive material and contaminates passengers or bystanders. This communication attempts to answer that need, presenting a step-by-step protocol for decontamination of a radiation victim, the rationale on which each step is based, a list of needed supplies, and a short summary of decorporation procedures that should be started in the emergency department. PMID:7425419

  3. Cryptographie Quantique : Protocoles et Graphes

    OpenAIRE

    Javelle, Jérôme

    2014-01-01

    Je souhaite réaliser un modèle théorique optimal pour les protocoles de partage de secret quantique basé sur l'utilisation des états graphes. Le paramètre représentatif d'un partage de secret à seuil est, entre autres la taille du plus grand ensemble de joueurs qui ne peut pas accéder au secret. Je souhaite donc trouver un famille de protocoles pour laquelle ce paramètre est le plus petit possible. J'étudie également les liens entre les protocoles de partage de secret quantique et des famille...

  4. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  5. Analysis of the Transport Layer Security protocol

    OpenAIRE

    Firing, Tia Helene

    2010-01-01

    In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these prot...

  6. Analyzing security of Authenticated Routing Protocol (ARAN)

    OpenAIRE

    Seema Mehla; Bhawna Gupta; Preeti Nagrath

    2010-01-01

    Ad hoc network allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol for ad hoc network operate in an ad hoc fashion, as on demand routing protocol often have low overhead and faster reaction time than other type of routingbased on periodic protocol. However variety of attacks targeting routing protocol have been identified. By attacking the routing protocol attacker can absorb network t...

  7. Optimistic Non-repudiation Protocol Analysis

    OpenAIRE

    Santos Santiago, Judson; Vigneron, Laurent

    2007-01-01

    Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.

  8. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  9. Additional protocol experience in Romania

    International Nuclear Information System (INIS)

    Full text: National Commission for Nuclear Activities Control (CNCAN) is the national regulatory body with regulation, authorization and control responsibilities. CNCAN has the right and obligation to ensure that safeguards are applied, in accordance with the terms of the safeguards agreement, on all source or special fissionable material in all peaceful nuclear activities within the State, under its jurisdiction or carried out under its control anywhere, for the exclusive purpose of verifying that such material is not diverted to nuclear weapons or other nuclear explosive devices. CNCAN has built a strong primary and secondary legislation in order to have a strong legal framework to fulfill the NPT, Safeguards Agreement and Additional Protocol requirements. In respect of the non-proliferation issues CNCAN has as a major goal to strengthen the effectiveness and to improve the efficiency of the safeguards system. Also closer co-operation between the IAEA and CNCAN as coordinator of the national system of accounting for and control of nuclear material has been developed by organizing international and national seminars on the implementation of safeguards and the additional protocol. After the entry into force of the Additional Protocol, CNCAN prepared appropriate declarations and answers to the relevant IAEA questions in order to obtain a drawn conclusion of the absence of undeclared nuclear material and nuclear activities within Romania territory. The IAEA evaluated in Romania not only the results of its nuclear material related activities under the Safeguards Agreement but also the results of its broader, more qualitative, evaluation and verification activities under the Additional Protocol. CNCAN assured that the IAEA inspectors have complementary access according to the Additional Protocol as requested in accordance with the provisions of the Safeguards Agreement and the Additional Protocol and cooperated in resolving in a timely manner, any questions or

  10. Synthesis, characterization, and in vitro anti-neoplastic activity of novel vic-dioximes bearing thiosemicarbazone side groups and their mononuclear complexes.

    Science.gov (United States)

    Babahan, İlknur; Özmen, Ali; Orhan, Nil; Kazar, Didem; Değirmenci, Esin Hafize

    2014-04-01

    Two novel vicinal dioxime ligands containing thiosemicarbazone units, (2E)-2-[4-(diethylamino)benzylidene]-N-[(1Z,2E)-N-hydroxy-2-(hydroxyimino)ethanimidoyl]hydrazine carbothioamide (L(1)H2) and (2E)-2-[4-(dimethylamino)benzylidene]-N-[(1Z,2E)-N-hydroxy-2-(hydroxyimino)ethanimidoyl]hydrazinecarbothioamide (L(2)H2), were synthesized. Using the HL-60 human leukemia cell line, the in vitro anti-neoplastic activity of these thiosemicarbazone-oxime derivatives was evaluated. Mononuclear nickel(II), copper(II), and cobalt(II) complexes with a metal:ligand ratio of 1:2 for both the L(1)H2 and L(2)H2 ligands were also synthesized. To characterize these compounds, Fourier transform-infrared spectroscopy (FT-IR), mass spectrometry (MS), magnetic susceptibility measurements, (1)H and (13)C nuclear magnetic resonance (NMR), ultraviolet-visible (UV-Vis) absorption spectroscopy, heteronuclear multiple-bond correlation (HMQC), and elemental analysis were performed. For L(1)H2, L(2)H2, and each of their derivatives, antiproliferative effects against HL-60 cells were exhibited and the associated IpC50 values ranged from 5μM to 20μM. Furthermore, L(1)H2 and its derivatives inhibited the proliferation of HL-60 cells more effectively than L(2)H2, and 5μM [Cu(L(1)H)2] exhibited the strongest antiproliferative activity. PMID:24651042

  11. Identification of differential anti-neoplastic activity of copper bis(thiosemicarbazones) that is mediated by intracellular reactive oxygen species generation and lysosomal membrane permeabilization.

    Science.gov (United States)

    Stefani, Christian; Al-Eisawi, Zaynab; Jansson, Patric J; Kalinowski, Danuta S; Richardson, Des R

    2015-11-01

    Bis(thiosemicarbazones) and their copper (Cu) complexes possess unique anti-neoplastic properties. However, their mechanism of action remains unclear. We examined the structure-activity relationships of twelve bis(thiosemicarbazones) to elucidate factors regarding their anti-cancer efficacy. Importantly, the alkyl substitutions at the diimine position of the ligand backbone resulted in two distinct groups, namely, unsubstituted/monosubstituted and disubstituted bis(thiosemicarbazones). This alkyl substitution pattern governed their: (1) Cu(II/I) redox potentials; (2) ability to induce cellular (64)Cu release; (3) lipophilicity; and (4) anti-proliferative activity. The potent anti-cancer Cu complex of the unsubstituted bis(thiosemicarbazone) analog, glyoxal bis(4-methyl-3-thiosemicarbazone) (GTSM), generated intracellular reactive oxygen species (ROS), which was attenuated by Cu sequestration by a non-toxic Cu chelator, tetrathiomolybdate, and the anti-oxidant, N-acetyl-l-cysteine. Fluorescence microscopy suggested that the anti-cancer activity of Cu(GTSM) was due, in part, to lysosomal membrane permeabilization (LMP). For the first time, this investigation highlights the role of ROS and LMP in the anti-cancer activity of bis(thiosemicarbazones). PMID:26335599

  12. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  13. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    concrete protocol by Blumberg et al. using one-way functions and commitments for providing various location based vehicle services, and report on our ndings and experience of carrying out its analysis using the ProVerif tool. Third, we make an abstract model of the powerful simulation-based Universally...

  14. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  15. About models of security protocols

    OpenAIRE

    Comon-Lundh, Hubert

    2008-01-01

    In this paper, mostly consisting of definitions, we revisit the models of security protocols: we show that the symbolic and the computational models (as well as others) are instances of a same generic model. Our definitions are also parametrized by the security primitives, the notion of attacker and, to some extent, the process calculus.

  16. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  17. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  18. Kyoto protocol on climate change

    International Nuclear Information System (INIS)

    This article reports a short overview of main points of Kyoto protocol to United Nations Framework Convention on climate Change and of some options still to be defined, evolutions of Italian emissions with respect to other European countries, check of decree by inter ministerial committee on economic planning on national plan to reduce emissions

  19. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele;

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  20. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele; Degano, Pierpablo; Nielson, Flemming; Nielson, Hanne Riis; Priami, Corrado

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  1. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  2. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  3. Improved Secure Address Resolution Protocol

    OpenAIRE

    Abhishek Samvedi; Sparsh Owlak; Vijay Kumar Chaurasia

    2014-01-01

    In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack. In the proposed model there is a central server on a network or subnet which prevents ARP spoofing attack.

  4. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  5. How to write a protocol: part 2.

    Science.gov (United States)

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  6. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  7. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  8. Neonatal euthanasia: The Groningen Protocol*

    Science.gov (United States)

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  9. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  10. Neonatal euthanasia: The Groningen Protocol.

    Science.gov (United States)

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  11. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  12. Kyoto: protocol on climate protection

    International Nuclear Information System (INIS)

    At the 3rd Conference of the Signatory States to the United Nations Climate Framework Convention held in Kyoto, the so-called Kyoto Protocol on the UN Climate Framework Convention was adopted unanimously, after two years of difficult and complex negotiations, on December 11, 1997. The protocol for the first time includes legally binding obligations for the industrialized countries requiring them to reduce their greenhouse gas emissions between 2008 and 2012 by a total of 5.2% relative to the 1990 level. In meeting this obligation, the industrialized countries assumed different levels of reduction and limitation, respectively. Thus, e.g., the EU countries accepted a Communitywide reduction by 8%, while the USA is obliged to reduce by 7% and Japan by 6%. (orig.)

  13. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  14. How to write a protocol: part 1.

    Science.gov (United States)

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  15. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  16. Automatic analysis of distance bounding protocols

    CERN Document Server

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  17. A student teamwork induction protocol

    OpenAIRE

    Kamau, Caroline; Spong, A.

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in HE. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group contract) designed to minimize social loafing, optimize coordination (by boosting good information sampling) and orient group dynamics towards the task. In the absen...

  18. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  20. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standa...... financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  1. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  2. Power Control Protocols in VANET

    OpenAIRE

    Samara, Ghassan; Salem, Amer O. Abu; Alhmiedat, Tareq

    2013-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.

  3. Bounding Component Behavior via Protocols

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav; Besta, Miloslav

    Los Alamitos : IEEE Computer Society, 1999 - (Firesmith, D.; Riehle, R.; Pour, G.; Meyer, B.), s. 387-398 ISBN 0-7695-0278-4. [TOOLS /30./. Santa Barbara (US), 01.08.1999-05.08.1999] R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Institutional research plan: AV0Z1030915 Keywords : software components * behavior protocols * software architecture Subject RIV: JC - Computer Hardware ; Software

  4. Security Protocol for Active Networks

    OpenAIRE

    Cheng, L.; Galis, A.

    2006-01-01

    Active packets carrying management and control code have a dynamic nature and support dynamic routing. Thus, active packets must be protected in an end-to-end and hop-to-hop fashion. In this paper, we present a novel approach, known as security protocol for active networks (SPAN), which enables an active packet to be securely transmitted during (instead of after) Security Association (SA) and management negotiations along a new execution path

  5. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  6. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  7. Component versioning for protocol configuration management

    Institute of Scientific and Technical Information of China (English)

    CHEN Tian-zhou; HE Zhen-jie; HUANG Jiang-wei; DAI Hong-jun

    2005-01-01

    Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration management on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.

  8. Crypto-Verifying Protocol Implementations in ML

    OpenAIRE

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F# code to CryptoVerif processes, and from CryptoVerif declarations to F# code. We present two case studies: an implementation of the Otway-Rees protocol, and an implementation of a simplified password-b...

  9. Simple and Efficient Contract Signing Protocol

    OpenAIRE

    Alaraj, Abdullah M.

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP...

  10. A father protocol for quantum broadcast channels

    OpenAIRE

    Dupuis, Frédéric; Hayden, Patrick; Li, Ke

    2006-01-01

    A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communica...

  11. Dexamethasone-(C21-phosphoramide-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549

    Directory of Open Access Journals (Sweden)

    Coyne CP

    2016-08-01

    did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10-9 M and 10-5 M. Rapid increases in antineoplastic cytotoxicity were observed at and between the dexamethasone equivalent concentrations of 10-9 M and 10-7 M where cancer cell death increased from 7.7% to a maximum of 64.9% (92.3%–35.1% residual survival, respectively, which closely paralleled values for “free” noncovalently bound dexamethasone. Discussion: Organic chemistry reaction regimens were optimized to develop a multiphase synthesis regimen for dexamethasone-(C21-phosphoramide-[anti-EGFR]. Attributes of dexamethasone-(C21-phosphoramide-[anti-EGFR] include a high dexamethasone molar incorporation-index, lack of extraneous chemical group introduction, retained EGFR-binding avidity (“targeted” delivery properties, and potential to enhance long-term pharmaceutical moiety effectiveness. Keywords: dexamethasone, anti-EGFR, organic chemistry reactions, synthesis, selective “targeted” delivery, covalent immunopharmaceuticals, EGFR 

  12. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is...

  13. Cryptanalysis on Cheng et al. protocol

    Science.gov (United States)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  14. Simple and Efficient Contract Signing Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

  15. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  16. Optimizing One Fair Document Exchange Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document's key. This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will be able to recover the key if the other party misbehaves. The protocol also incorporates the concept of enforcing the honesty of one party. The proposed protocol consists of only three messages and is more efficient than related protocols.

  17. Vulnerabilities in Quantum Key Distribution Protocols

    CERN Document Server

    Kuhn, D R

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest that quantum cryptographic protocols, like conventional protocols, may be vulnerable to methods of attack that were not envisaged by their designers.

  18. Novel Ω-protocols for NP

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Ω-protocols, introduced by Garay, Mackenzie and Yang, is a variant of S-protocols with online extractor which is a useful tool to overcome the nest effect in concurrent scenario. In this work, we construct an Ω-protocol for Hamiltonian cycle problem, and therefore, it allows us to present Ω-protocol for any NP relation. For most general NP relations, our construction of Ω-protocols is much more efficient than the informal one described by Garay et al. and we believe that the method for our construction may be of independent interest.

  19. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and......It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework is...

  20. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  1. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  2. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...... representation and do not address how to build up protocol representations in a compositional fashion. This dissertation presents a new, event-based approach to reasoning about security protocols. We seek a broader class of models to show how event-based models can be structured in a compositional way and so...

  3. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  4. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  5. Antineoplastic Activity of New Transition Metal Complexes of 6-Methylpyridine-2-carbaldehyde-N(4-ethylthiosemicarbazone: X-Ray Crystal Structures of [VO2(mpETSC] and [Pt(mpETSCCl

    Directory of Open Access Journals (Sweden)

    Shadia A. Elsayed

    2010-01-01

    Full Text Available New complexes of dioxovanadium(V, zinc(II, ruthenium(II, palladium(II, and platinum(II with 6-methylpyridine-2-carbaldehyde-N(4-ethylthiosemicarbazone (HmpETSC have been synthesized. The composition of these complexes is discussed on the basis of elemental analyses, IR, Raman, NMR (H1, C13, and P31, and electronic spectral data. The X-ray crystal structures of [VO2(mpETSC] and [Pt(mpETSCCl] are also reported. The HmpETSC and its [Zn(HmpETSCCl2] and [Pd(mpETSCCl] complexes exhibit antineoplastic activity against colon cancer human cell lines (HCT 116.

  6. Planetary Protection Alternate Protocol Certification

    Science.gov (United States)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  7. Protocols for calibrating multibeam sonar

    OpenAIRE

    Foote, Kenneth G.; Chu, Dezhang; Hammar, Terence R.; Baldwin, Kenneth C.; Mayer, Larry A.; Hufnagle, Lawrence C. jr.; Jech, J. Michael

    2005-01-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University o...

  8. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  9. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  10. Secure E-Commerce Protocol

    Directory of Open Access Journals (Sweden)

    Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin

    2011-04-01

    Full Text Available E-commerce has presented a new way of doing business all over the world using internet.Organizations have changed their way of doing business from a traditional approach to embrace ecommerceprocesses. As individuals and businesses increase information sharing, a concernregarding the exchange of money securely and conveniently over the internet increases. Therefore,security is a necessity in an e-commerce transaction. The purpose of this paper is to present atoken based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm thatis capable of satisfying security objectives by using token based security mechanism.

  11. NEURAPRO-E study protocol

    DEFF Research Database (Denmark)

    Markulev, Connie; McGorry, Patrick D; Nelson, Barnaby;

    2016-01-01

    response to omega-3 PUFA treatment in the UHR group. CONCLUSION: This is the protocol of the NeuraproE study. Utilizing a large sample, results from this study will be important in informing indicated prevention strategies for schizophrenia and other psychotic disorders, which may be the strongest avenue...... polyunsaturated fatty acids (PUFAs), coupled with the falling transition rate in ultra high-risk (UHR) samples, mean that further study of such benign, potentially neuroprotective interventions is clinically and ethically required. Employing a multicentre approach, enabling a large sample size, this study will...

  12. Trust relationships in exchange protocols

    OpenAIRE

    González-Deleito Collell, Nicolás

    2005-01-01

    Les protocoles d'échange d'informations représentent un des grands domaines actuels de recherche en sécurité informatique, et sont entre autres à la base des mécanismes de commerce électronique. Ils sont par exemple nécessaires à la réalisation d'un achat en ligne, à la signature d'un contrat électronique et au courrier électronique recommandé. Dans ces exemples, les échanges d'informations consistent à échanger respectivement un objet électronique contre un paiement, des signatures digitales...

  13. Trypanosoma spp. ring test protocol

    International Nuclear Information System (INIS)

    Test material will be chosen by the coordinating lab for incorporation into a proficiency panel after repeated testing by more than one analyst on multiple PCR runs on different days. Test material: suitable test material will be provided. Protocol and laboratory procedures: Each laboratory is allowed to use their own 'in-house' test procedure (SOPs will nevertheless be provided by the respective laboratories for comparison and evaluation). Each PCR should be executed on two separate occasions. Test material used will be coded and sent as a blind panel to the participants. Each participating laboratory will be given a unique set of codes

  14. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  15. Protocolized Resuscitation of Burn Patients.

    Science.gov (United States)

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  16. Internet protocol television (IPTV) services

    OpenAIRE

    Nuuri, Aminullah

    2011-01-01

    The purpose of this thesis is to know what IPTV is and how the IPTV network architectures work. The role of IPTV is to deliver video, audio and data commonly called triple play services over an IP network. This thesis describes how video on demand (VOD) shows its relation to the IPTV and introduces unicast and multicast services, IPTV protocols such as RTP and RSTP, IPTV set-top box and some other common ways of this particular technology. It also demonstrates how the Sonera IPTV system deliv...

  17. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  18. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  19. Frequencies of 23 functionally significant variant alleles related with metabolism of antineoplastic drugs in the Chilean population: comparison with Caucasian and Asian populations

    Directory of Open Access Journals (Sweden)

    Angela Margarita Roco

    2012-11-01

    Full Text Available Cancer is a leading cause of death worldwide. The cancer incidence rate in Chile is 133.7/100,000 inhabitants and it is the second cause of death, after cardiovascular diseases. Most of the antineoplastic drugs are metabolized to be detoxified, and some of them to be activated. Genetic polymorphisms of drug-metabolizing enzymes can induce deep changes in enzyme activity, leading to individual variability in drug efficacy and/or toxicity. The present research describes the presence of genetic polymorphisms in the Chilean population, which might be useful in public health programs for personalized treatment of cancer, and compare these frequencies with those reported for Asian and Caucasian populations, as a contribution to the evaluation of ethnic differences in the response to chemotherapy.We analyzed 23 polymorphisms in a group of 253 unrelated Chilean volunteers from the general population. The results showed that CYP2A6*2, CYP2A6*3, CYP2D6*3, CYP2C19*3 and CYP3A4*17 variant alleles are virtually absent in Chileans. CYP1A1*2A allele frequency (0.37 is similar to that of Caucasians and higher than that reported for Japanese people. Allele frequencies for CYP3A5*3 (0.76 and CYP2C9*3 (0.04 are similar to those observed in Japanese people. CYP1A1*2C (0.32, CYP1A2*1F (0.77, CYP3A4*1B(0.06, CYP2D6*2(0.41 and MTHFR T(0.52 allele frequencies are higher than the observed either in Caucasian or in Japanese populations. Conversely, CYP2C19*2 allele frequency (0.12 and GSTT1null (0.11 and GSTM1null (0.36 genotype frequencies are lower than those observed in both populations. Finally, allele frequencies for CYP2A6*4(0.04, CYP2C8*3(0.06, CYP2C9*2(0.06, CYP2D6*4(0.12, CYP2E1*5B(0.14, CYP2E1*6(0.19, and UGT2B7*2(0.40 are intermediate in relation to those described in Caucasian and in Japanese populations, as expected according to the ethnic origin of the Chilean population.In conclusion, our findings support the idea that ethnic variability must be considered

  20. Telomerase Repeated Amplification Protocol (TRAP)

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W.

    2016-01-01

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al., 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC- counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al., 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  1. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    Directory of Open Access Journals (Sweden)

    Seema Mehla

    2010-05-01

    Full Text Available the Extensible Authentication Protocol (EAP is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP re-authentication protocol, andcompared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP reauthentication protocol is only twentieth of that in the EAPTLS protocol.

  2. Novel construction of Secure RFID Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Shafiqul Abidin

    2014-10-01

    Full Text Available This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.

  3. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...

  4. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  5. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  6. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  7. Training parents to implement pediatric feeding protocols.

    OpenAIRE

    Mueller, Michael M; Piazza, Cathleen C; Moore, James W; Kelley, Michael E; Bethke, Stephanie A; Pruett, Angela E; Oberdorff, Amanda J; Layer, Stacy A

    2003-01-01

    Four different multicomponent training packages were evaluated to increase the treatment integrity of parents implementing pediatric feeding protocols. In Study 1 we exposed 3 parents to a training package that consisted of written protocols (baseline), verbal instructions, therapist modeling, and rehearsal training. Results suggested that the package was successful in increasing treatment integrity of the feeding protocols to high levels. Study 2 investigated three different parent-training ...

  8. Formal Support for Standardizing Protocols with State

    OpenAIRE

    Guttman, Joshua D.; Liskov, Moses D.; Ramsdell, John D.; Rowe, Paul D.

    2015-01-01

    Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions. We adapt one of these tools, {\\cpsa}, to provide automated support for reasoning about state. We us...

  9. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  10. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  11. Security in network environment-network protocols

    OpenAIRE

    Fessl, Jaromír

    2011-01-01

    Work is focused on network protocols features and security characteristics. Overview of protocols is made through all layers of OSI model and by this design structured. For each layer is made summary of interesting facts. Separate chapter is dedicated for VPN and for implementation possibilities of VPN. In chapter Practical problems are reflected most important problems of actual security (from network protocol point of view) concerned on SSL/TLS, SMTP and DNS. Together with security charact...

  12. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  13. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    OpenAIRE

    Jelena Ćurguz

    2016-01-01

    This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attac...

  14. Security Aspects of Distance-Bounding Protocols

    OpenAIRE

    Onete, Maria Cristina

    2012-01-01

    Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifier to decide whether a prover is legitimate or not. Such protocols enable access control, and are used in e.g.~logistics, public transport, or personal identification. An authentication protocol is considered secure if an adversary cannot impersonate a legitimate prover. Such an adversary may eavesdrop authentication attempts between a legitimate prover and a legitimate verifier, interact with ...

  15. SCRUTINY OF BROADCASTING PROTOCOLS IN VANET

    OpenAIRE

    Rohini Nere; Uma Nagaraj

    2015-01-01

    Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protoc...

  16. Emission trading under the Kyoto Protocol

    OpenAIRE

    Holtsmark, Bjart; Hagem, Cathrine

    2003-01-01

    On 11 December 1997, delegates to the third conference of the Parties to the UN Framework Convention on Climate Change agreed upon the Kyoto Protocol. The protocol sets binding emission targets for developed nations (Annex B countries). The Protocol states that Annex B countries may participate in emission trading. The rules for emission trading are to be discussed at the fourth Conference of the Parties in November 1998. differentiation of targets among countries, but not in any system...

  17. Enhancements to A Lightweight RFID Authentication Protocol

    CERN Document Server

    Zhang, Xiaowen; Wei, Xinzhou

    2008-01-01

    Vajda and Buttyan (VB) proposed a set of five lightweight RFID authentication protocols. Defend, Fu, and Juels (DFJ) did cryptanalysis on two of them - XOR and SUBSET. To the XOR protocol, DFJ proposed repeated keys attack and nibble attack. In this paper, we identify the vulnerability existed in the original VB's successive session key permutation algorithm. We propose three enhancements to prevent DFJ's attacks and make XOR protocol stronger without introducing extra resource cost.

  18. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  19. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  20. Optimizing One Fair Document Exchange Protocol

    OpenAIRE

    Alaraj, Abdullah M.

    2012-01-01

    This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document's key. This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will be able to recover the key if the other party misbehaves. The protocol also incorporates the concep...

  1. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  2. CIMS Network Protocol and Its Net Models

    Institute of Scientific and Technical Information of China (English)

    罗军舟; 顾冠群

    1997-01-01

    Computer communication network architectures for cims are based on the OSI Reference Model.In this paper,CIMS network protocol model is set up on the basis of the corresqonding service model.Then the authors present a formal specification of transport protocols by using an extended Predicate/Transition net system that is briefly introduced in the third part.Finally,the general methods for the Petri nets based formal specification of CIMS network protocols are outlined.

  3. Vulnerabilities in Quantum Key Distribution Protocols

    OpenAIRE

    Kuhn, D. Richard

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest th...

  4. Security Protocol Verification: Symbolic and Computational Models

    OpenAIRE

    Blanchet, Bruno

    2012-01-01

    Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches.

  5. A Formal Approach to Protocol Performance Testing

    Institute of Scientific and Technical Information of China (English)

    XU Mingwei; WU Jianping

    1999-01-01

    This paper proposes a formal approach to protocol performance testing based on the extended concurrent TTCN. To meet the needs of protocol performance testing, concurrent TTCN is extended, and the extended concurrent TTCN's operational semantics is defined in terms of Input-Output Labeled Transition System. An architecture design of protocol performance test system is described, and an example of test cases and its test resultare given.

  6. Universal protocol for alopecia areata clinical studies.

    Science.gov (United States)

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  7. Rewriting-Based Verification of Authentication Protocols

    OpenAIRE

    Ogata, Kazuhiro; Futatsugi, Kokichi

    2004-01-01

    We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then written in CafeOBJ and the proof scores are executed (rewritten) by the CafeOBJ system.

  8. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  9. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  10. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  11. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  12. Hiro Hirai's BAC-FISH Protocol

    OpenAIRE

    sprotocols

    2014-01-01

    Author: Schistosoma Genome Network ### Overview This protocol is a modification of the standard FISH protocol published by Hiro Hirai and Phil LoVerde in Parasitology Today (1995, 11(8) p 310-314) that has been optimised for use with BAC probes and should be read in conjunction with the published protocol. This protocol uses the BIOPRIME reaction kit from GibcoBRL to prepare biotin-labelled BAC DNA which is detected using FITC-Avidin (Vector Labs, DCS grade). Reagents from other ...

  13. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  14. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  15. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  16. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David; Procaccia, Ariel

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete...... computational model and reasoning about the game-theoretic properties of algorithms that operate in this model. Specifically, we show that each protocol in the class of generalized cut and choose (GCC) protocols — which includes the most important discrete cake cutting protocols — is guaranteed to have...

  17. A formal model of fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    QING Sihan; LI Gaicheng

    2005-01-01

    Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability,etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack.Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.

  18. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  19. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  20. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  1. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri;

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  2. A New Watermarking Protocol against Conspiracy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  3. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  4. Quantum three-pass cryptography protocol

    Science.gov (United States)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  5. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  6. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  7. Specification of a Collision-Free CSMA MAC Protocol for Wireless LANs: the CANlike protocol

    OpenAIRE

    Juanole, Guy; Nguyen, Xuan Hung; Mouney, Gérard

    2013-01-01

    Collision-free Medium Access Control (MAC) protocols based on Carrier Sense Multiple Access (CSMA) and priorities associated to the frames are interesting solutions in considering real-time traffic in a wireless context.We have already presented such a protocol using priorities represented by the BlackBurst technique [1]. The goal of this paper is, at first and mainly, to specify another such protocol, named CANlike, which is an adaptation of the wired CAN bus protocol to the wireless context...

  8. A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext

    OpenAIRE

    Bo Meng

    2009-01-01

    Internet voting protocol is the base of the Internet voting systems. Firstly, an improved proof protocol that two ciphertexts are encryption of the same plaintext is introduced. Secondly, a receipt-free and coercion-resistant Internet voting protocol based on the non-interactive deniable authentication protocol and an improved proof protocol that two ciphertexts are encryption of the same plaintext is developed. Thirdly, we analyze the proposed Internet voting protocol. The proposed Internet ...

  9. MTP: An atomic multicast transport protocol

    Science.gov (United States)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  10. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  11. A Study of Voice over Internet Protocol

    OpenAIRE

    Mohsen Gerami

    2010-01-01

    Voice over Internet Protocol, is an application that enables data packet networks to transport real time voice traffic. VOIP uses the Internet as the transmission network. This paper describes VoIP and its requirements. The paper further discusses various VoIP protocol, security and its market.

  12. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  13. Secure Geographic Routing Protocols: Issues and Approaches

    OpenAIRE

    Mehdi sookhak; Ramin Karimi; NorafidaIthnin; Mahboobeh Haghparast; Ismail FauziISnin

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  14. Secure Geographic Routing Protocols: Issues and Approaches

    CERN Document Server

    sookhak, Mehdi; Haghparast, Mahboobeh; ISnin, Ismail Fauzi

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  15. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  16. Welfare monitroing system : assessment protocol for horses

    NARCIS (Netherlands)

    Livestock Research,

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  17. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier;

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  18. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  19. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  20. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    Directory of Open Access Journals (Sweden)

    Jelena Ćurguz

    2016-05-01

    Full Text Available This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attack, the potential consequences, but also studying methods of defense. All versions of the protocol are going to be the subject of the research but emphasis will be placed on the critical attack that the most endanger the safety of data. The goal of the research is to point out the danger of existence of at least vulnerability in the SSL/TLS protocol, which can be exploited and endanger the safety of the data that should be protected.

  1. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  2. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  3. A Rational Approach to Cryptographic Protocols

    CERN Document Server

    Caballero-Gil, P; Bruno-Castañeda, C; 10.1016/j.mcm.2006.12.013

    2010-01-01

    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries.

  4. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    need to combine their strengths. Moreover, we need to ensure that the protocol implementation coincides with the formal model that we verify using such tools. This thesis shows that we can simplify the formal verification of protocols in several ways. First, we introduce an Alice and Bob style language...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...... robust implementations in different languages. Moreover, SPS has the "ultimate” formal semantics for Alice and Bob notation in the presence of an arbitrary set of cryptographic operators and their algebraic theory. Despite its generality, this semantics is mathematically simpler than any previous attempt...

  5. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  6. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past...... work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...... trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws....

  7. Forests and the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Goetze, D.C. [Environment Canada, Ottawa, ON (Canada)

    2001-07-01

    This PowerPoint presentation referred to carbon sinks in the Clean Development Mechanism (CDM) as specified in the Kyoto Protocol. Policy issues, opportunities and challenges were discussed. The slides summarized the environmental potential of carbon sink projects, the current status of carbon sinks in the CDM, and strategies towards a CDM carbon sink. The Nyakach, Kenya biomass enhancement case study was presented, along with the Colombian Andean biodiversity corridor reforestation project. Potential sink projects were described as those resulting in direct reduction of emissions. These include reducing deforestation by protecting forests from being converted to agriculture, by protecting forests from the impacts of human activities, and by substituting biomass energy sources for fossil fuels. Indirect reduction of emissions via sequestration involves restoring natural forests in deforested or degraded areas and expanding agroforests and plantations. The co-benefits of carbon sink projects are biodiversity and socio-economic benefits. Under the Bonn Agreement, afforestation and reforestation projects are eligible under the CDM. Credits are limited to 1 per cent of Annex 1 party's base year emissions per year. The important elements of the Marrakech Accord are the prompt start of the CDM, as well as modalities and procedures.

  8. Liquid-liquid extraction combined with high performance liquid chromatography-diode array-ultra-violet for simultaneous determination of antineoplastic drugs in plasma

    Directory of Open Access Journals (Sweden)

    Ananda Lima Sanson

    2011-06-01

    Full Text Available A liquid-liquid extraction (LLE combined with high-performance liquid chromatography-diode array detection method for simultaneous analysis of four chemically and structurally different antineoplastic drugs (cyclophosphamide, doxorubicin, 5-fluorouracil and ifosfamide was developed. The assay was performed by isocratic elution, with a C18 column (5 µm, 250 x 4.6 mm and mobile phase constituted by water pH 4.0- acetonitrile-methanol (68:19:13, v/v/v, which allowed satisfactory separation of the compounds of interest. LLE, with ethyl acetate, was used for sample clean-up with recoveries ranging from 60 to 98%. The linear ranges were from 0.5 to 100 µg mL-1, for doxorubicin and 1 to 100 µg mL-1, for the other compounds. The relative standard deviations ranged from 5.5 to 17.7%. This method is a fast and simple alternative that can be used, simultaneously, for the determination of the four drugs in plasma, with a range enabling quantification of the drugs in pharmacokinetics, bioequivalence and therapeutic drug-monitoring studies.Um método de extração líquido-líquido (ELL combinado com cromatografia líquida de alta eficiência-detector de arranjo de diodos foi desenvolvido para análise simultânea de quatro fármacos antineoplásicos quimicamente e estruturalmente diferentes (ciclofosfamida, doxorrubicina, fluoruracila e ifosfamida. O estudo foi realizado sob condições isocráticas, com coluna C18 (5µm, 250 x 4.6 mm e fase móvel constituída por água pH 4.0-acetonitrila-metanol (68:19:13, v/v/v, que permitiu separação satisfatória dos analitos de interesse. A ELL, com acetato de etila, foi utilizada para limpeza da amostra, com recuperação variando de 60 a 98%. As faixas foram lineares de 0,5 a 100 µg mL-1 para doxorrubicina e 1 a 100 µg mL-1 para os outros compostos. O desvio padrão relativo variou de 5,5 a 17,7%. Este método é uma alternativa rápida e simples que pode ser usado, simultaneamente, para a determinação dos

  9. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    International Nuclear Information System (INIS)

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions

  10. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  11. Energy Efficient Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    S.Gopinath

    2012-03-01

    Full Text Available In recent years, many energy-efficient routing protocols have been proposed. However, very little efforts have been taken in studying the energy consumption of individual node, overhead and route maintaining issues. While not considering the design of energy efficient routing protocol, it may perform very worst than the normal routing protocol. Here, we have proposed On Demand Based Energy Efficient Routing Protocol (ODBEERP. The main aim of proposed protocol is to discover the minimum power-limitation route. The power limitation of a route is decided by the node which has the minimum energy in that route. So compared with the minimum node energy in any other route, the minimum node energy in the minimum power-limitation route has more energy. We have also proposed a more accurate analysis to track the energy consumptions due to various factors, and improve the performance during path discovery and in mobility scenarios. The proposed protocol is evaluated with object oriented discrete event simulator environment. Simulation results shows that the ODBEERP achieves good throughput, less delay, high packet delivery ratio and good energy efficiency than the existing protocol PEER.

  12. A Review of Fair Exchange Protocols

    Directory of Open Access Journals (Sweden)

    Abdullah AlOtaibi

    2012-08-01

    Full Text Available Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we review these protocols in detail. In addition, we present a survey of three fair exchange protocols based on online TTP from different application areas. In particular, we review these protocols with regard to certain properties, namely, fairness, correctness of product, customer's anonymity, timeliness and channel requirement.

  13. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy‐preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi‐label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  14. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  15. Demand Priority Protocol Simulation and Evaluation

    Institute of Scientific and Technical Information of China (English)

    ZHAN Yongzhao; SONG Shunlin; XIE Li

    1999-01-01

    A new network protocol (DemandPriority Protocol) environment can provide more satisfying service fordifferent urgent transmission requests. In this paper, in order toprovide guidance for the selection of environment of multimedia datatransmission in Computer Supported Cooperative Work better, anobject-oriented protocol specification language based on C++ is used todesign a virtual environment of multiworkstation of computer cooperativework and to simulate exe-cution of demand priority network protocoland then the performances of various transmission requests are analyzed.Finally, an evaluation of the demand priority LAN is given.

  16. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  17. Re-examining generalized teleportation protocol

    Science.gov (United States)

    Xia, Yan; Song, Jie; Song, He-Shan

    2007-11-01

    We present an explicit generalized protocol for probabilistic teleportation of an arbitrary N-qubit GHZ entangled state via only one non-maximally two-qubit entangled state. Without entanglement concentration, using standard Bell-state measurement and classical communication one cannot teleport the state with unit fidelity and unit probability. We show that by properly choosing the measurement basis it is possible to achieve unity fidelity transfer of the state. Compared with Gordon et al's protocol [G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 042309], this protocol has the advantage of transmitting much less qubits and classical information for teleporting an arbitrary N-qubit GHZ state.

  18. Security-Preserving Asymmetric Protocol Encapsulation

    OpenAIRE

    Vaudenay, Serge; Phan, Raphael C-W

    2007-01-01

    Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different roles, and for which there is a need for two-way linkability between queries and responses within the protocol. We are motivated by the observation that though results exist in other related contexts, no provably secure scheme has been applied to the setting of client-server protocols, which differ from conventional co...

  19. Efficient Three Party Key Exchange Protocol

    OpenAIRE

    H. K. Pathak; Manju Sanghi

    2012-01-01

    Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. In 1976, Diffie and Hellman proposed the first practical key exchange (DH key exchange) protocol.  In 2005, Abdalla and  Pointcheval suggested  a new variation  of the computational   DH assumption  called chosen based computational Diffie Hellman (CCDH)  and presented  simple password based authenticated  key exchange protocols.  Since then several three...

  20. Performance evaluation of TCP over ABT protocols

    Science.gov (United States)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  1. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  2. The Russian Federation and the Kyoto Protocol

    OpenAIRE

    Douma, Wybe; Ratsiborinskaya, Daria

    2007-01-01

    textabstractThis book brings together the results of two conferences: 'The Kyoto Protocol and beyond: A legal perspective', organised by the University of Siena on 10-11 June 2006, and 'Tackling Climate Change: An appraisal of the Kyoto Protocol and options for the future', held at the T.M.C. Asser Institute in The Hague on 30-31 March 2007. These conferences focused on the legal aspects of the Kyoto Protocol implementation and the post-2012 regime. Experts in European and international envir...

  3. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  4. Análisis de las dosificaciones en los esquemas de citostáticos en el cáncer de mama Analysis of the dosages in the antineoplastic agents schemes in breast cancer

    Directory of Open Access Journals (Sweden)

    Maritza Ramos Fernández

    2005-08-01

    Full Text Available Se realizó un estudio retrospectivo entre enero y junio de 2003, en el que se revisaron las órdenes médicas y las historias clínicas respectivas de 183 pacientes con cáncer de mama, atendidas en el Instituto de Oncología y Radiobiología, las cuales incluyeron en sus tratamientos esquemas de mezclas intravenosas de citostáticos. Para el análisis realizado se tuvieron en cuenta variables como edad, peso, talla, antecedentes patológicos, esquemas de tratamientos citostáticos prescritos y posología, lo cual permitió establecer la selección adecuada de los tratamientos y definir la dosificación correcta que debía recibir cada paciente. En la muestra objeto de estudio predominaron las pacientes comprendidas en edades entre 40-59 años; 67 pacientes presentaron antecedentes patológicos, y se observó la mayor frecuencia en edades superiores a los 50 años. Las mezclas de citostáticos más utilizadas correspondieron a los fármacos ciclofosfamida-metotrexate-5-fluourouracilo (CMF y ciclofosfamida-adriamicina-5-fluoracilo (CAF. Se detectaron 61 errores de medicación, que representó el 33,3 % del total de la muestra analizada; de ellos 40 pacientes (22 % por subdosificación, 20 pacientes (11 % por sobredosificación y 1 paciente que por sus antecedentes patológicos, tenía contraindicado el uso de adriamicina. Se demostró que es necesario la incorporación del profesional farmacéutico en el equipo multidisciplinario de quimioterapia oncológica, para brindar un servicio asistencial de mayor calidad y evitar riesgos potenciales o reales por el uso inadecuado de los agentes citostáticos.A retrospective study was conducted between January and June, 2003 to review the medical indications and the medical histories of 183 patients with breast cancer that received attention at the Institute of Oncology and Radiobiology, and that were administered intravenous mixtures of antineoplastic agents as part of their treatment. Variables such as

  5. Attempts at the production of more selective antitumourals. Part I. The antineoplastic activity of cyclophosphazenes linked to the polyamines 1,3-diaminopropane and 1,4-diaminobutane (putrescine)

    Science.gov (United States)

    Labarre, Jean-François; Guerch, Guy; Sournies, François; Spreafico, Federico; Filippeschi, Stefania

    1984-06-01

    In an attempt to design antitumour cyclophosphazenes of improved specificity by linking them to some natural tumour finders, we studied the binding of gem-N 3P 3Az 4Cl 2 to 1,3-diaminopropane and 1,4-diaminobutane (putrescine). Synthesis, mass spectrum and NMR as well as X-ray crystal structures of the two spirocyclic N 3P 3Az 4 [HN(CH 2) 3,4NH] derivatives (in which the N 3P 3Az 4 active principle is linked to the diamine in a spiro configuration) are described. Results obtained with these compounds in 3 murine tumour systems (L1210 and P388 leukaemias and P815 mastocytoma), showing their potent antineoplastic activity in vivo obtainable at well-tolerated doses, are also described.

  6. Cryptanalysis of a hybrid authentication protocol for large mobile networks

    OpenAIRE

    Mitchell, Chris; Tang, Q.

    2006-01-01

    In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, namely the intra-domain authentication protocol and the inter-domain authentication protocol, which are used depending on whether the user and the request service are located in the same domain. We show that both sub-protocols suffer from a number of security vulnerabilities.

  7. A Cryptographic Moving-Knife Cake-Cutting Protocol

    OpenAIRE

    Yoshifumi Manabe; Tatsuaki Okamoto

    2012-01-01

    This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction ...

  8. National Wildlife Refuge System Survey Protocol Template

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This template was developed for drafting National Wildlife Refuge System NWRS Survey Protocols. The template is arranged in the same order as the eight basic...

  9. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  10. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  13. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  14. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to...... "statistically significant" or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find...... (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain the...

  15. A Protocol for Messaging to Extraterrestrial Intelligence

    CERN Document Server

    Atri, Dimitra; Haqq-Misra, Jacob

    2011-01-01

    Messaging to extraterrestrial intelligence (METI) is a branch of study concerned with constructing and broadcasting a message toward habitable planets. Since the Arecibo message of 1974, the handful of METI broadcasts have increased in content and complexity, but the lack of an established protocol has produced unorganized or cryptic messages that could be difficult to interpret. Here we outline the development of a self-consistent protocol for messaging to extraterrestrial intelligence that provides constraints and guidelines for the construction of a message in order to maximize the probability that the message effectively communicates. A METI protocol considers several factors including signal encoding, message length, information content, anthropocentrism, transmission method, and transmission periodicity. Once developed, the protocol will be released for testing on different human groups worldwide and across cultural boundaries. An effective message to extraterrestrials should at least be understandable ...

  16. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  17. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  18. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  19. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  20. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  1. Quantum communication protocols based on entanglement swapping

    OpenAIRE

    Morales-Luna, Guillermo

    2015-01-01

    We recall several cryptographic protocols based on entanglement alone and also on entanglement swapping. We make an exposition in terms of the geometrical aspects of the involved Hilbert spaces, and we concentrate on the formal nature of the used transformations.

  2. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  3. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  4. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick;

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process...... but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...... used in real systems. Our results show that network coding achieves 100% reliability, even for hostile network conditions, while gathering data 10 times faster than standard master-slave schemes....

  5. Cryptanalysis of Two RFID Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Tianjie Cao

    2009-07-01

    Full Text Available Radio frequency identi¯cation (RFID technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protocol cannot resist replay attacks, and therefore an adversary can impersonate a legal tag. Next, we present a full-disclosure attack on the CWH protocol. By sending malicious queries to a tag and collecting the response messages emitted by the tag, the full-disclosure attack allows an adversary to extract the secret information from the tag.

  6. A Secure DSDV Protocol for Manets

    Directory of Open Access Journals (Sweden)

    M.Kalavathi

    2013-05-01

    Full Text Available This paper presents a secure destination-sequenced distance-vector routing protocol (SDSDV for ad hoc mobile wireless networks. The proposed protocol is based on the regular DSDV protocol. Within SDSDV, each node maintains two one-way hash chains about each node in the network. Two additional fields, which we call AL (alteration field and AC (accumulation field, are added to each entry of the update packets to carry the hash values. With proper use of the elements of the hash chains, the sequence number and the metric values on a route can be protected from being arbitrarily tampered. In comparison with the secure efficient distance vector (SEAD protocol previously proposed in the literature provides only lower bound protection on the metrics, SDSDV can provide complete protection.

  7. Formal validation of a deterministic MAC protocol

    OpenAIRE

    Godary-Dejean K.; Andreu D.

    2013-01-01

    This article deals with the formal validation of a medium access protocol. This protocol has been designed to meet the specific requirements of an implantable network-based neuroprosthese. This article presents the modeling of STIMAP with Time Petri Nets (TPN), and the verification of the deterministic medium access it provides, using timed model checking. Doing so, we show that existent formal methods and tools are not perfectly suitable for the validation of real system, espe- cially when s...

  8. SPION: Secure Protocols in OSI Networks

    OpenAIRE

    Ahlgren, Bengt; Lindgren, Per; Sirotkin, Teet

    1989-01-01

    SPION: Secure Protocols in OSI Networks This report describes how security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) reference model for communication. The report starts with defining security requirements for a "typical" local area network in a company, university or similar organization. It is assumed that the organization does not use the network for transfer of extremely sensitive information, such a...

  9. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  10. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  11. ASAP : a protocol for symbolic computation systems

    OpenAIRE

    Dalmas, Stéphane; Gaetano, Marc; Sausse, Alain

    1994-01-01

    This report describes the conception and the implementation of a simple protocol for exchanging mathematical data between processes. Our purpose is to enable symbolic computation systems to communicate and cooperate together but also with user programs, graphical interfaces, curve and surface plotters. In the first part, we study the general problem of the exchanging ofmathematical data. The second part defines the protocol. Then, we present the documentation of a C library which implements A...

  12. Dose protocols of acetylcholine test in Chinese

    Institute of Scientific and Technical Information of China (English)

    向定成; 龚志华; 何建新; 洪长江; 邱建; 马骏

    2004-01-01

    @@ Acetylcholine test has been widely used clinically in several countries as a practical test provoking coronary artery spasm.1-3 Although it has also been launched recently in a few hospitals in China, the dose protocol for acetylcholine test used in these hospitals were from abroad.4,5 This study was aimed at developing a dose protocol for acetylcholine test suitable for Chinese people.

  13. Analyzing the exhaustiveness of the synapse protocol

    OpenAIRE

    Marinkovic, Bojan; Ciancaglini, Vincenzo; Ognjanovic, Zoran; Glavan, Paola; Liquori, Luigi; Maksimovic, Petar

    2015-01-01

    International audience The Synapse protocol is a scalable protocol designed for information retrieval over inter-connected heterogeneous overlay networks. In this paper, we give a formal description of Synapse using the Abstract State Machines framework. The formal description pertains to Synapse actions that manipulate distributed keys. Based on this formal description, we present results concerning the expected exhaustiveness for a number of scenarios and systems maintained by the Synaps...

  14. Voice over Internet Protocol (VOIP): Future Potential

    OpenAIRE

    Ms. Deepti

    2014-01-01

    VoIP (voice over IP) delivers standard voice over telephone services over Internet Protocol (IP). VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol) network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet...

  15. An Anonymous Secure Routing Using OLSR Protocol

    OpenAIRE

    Osiers Gyamfuah Grace; Dr. John Rajan

    2013-01-01

    Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET). Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS) device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated int...

  16. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  17. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  18. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  19. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  20. Parent Siblings Oriented Tree Quorum Protocol

    OpenAIRE

    Anurag Singh; Ashish Kumar Rai,; Anup Kumar Jayswal; Meenu

    2011-01-01

    In this paper, we are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. Thisalgorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a small read quorum as well as a small write quorum while guaranteeing fault-tolerance of write operations. With this algorithm read operation is executed by reading one copy in failure-free env...

  1. The Kyoto Protocol: Can We Meet?

    OpenAIRE

    Boromisa, Ana-Maria; Tišma, Sanja

    2008-01-01

    Integration into the EU is one of strategic foreign policy goals of Croatia. Before accession, Croatia has to align with the EU policies and legislation. The European Commission in its Croatia 2007 Progress report identified ratification of the Kyoto Protocol as progress regarding environmental chapter of accession negotiations. By ratifying the Kyoto Protocol in May 2007 Croatia pledged to reduce greenhouse gases by 5% in the first commitment period, 2008-2012, from the amount released into ...

  2. The obscure future of the Kyoto protocol

    OpenAIRE

    Tsayem Demaze, Moise

    2013-01-01

    Since it came into effect in 2005 followed by its first period of application from 2008 to 2012, the Kyoto protocol has been subject to debates and international negotiations about its post-2012 future. Many grey areas persist, even though the Durban conference, held in December 2011, and the Doha conference, held in December 2012, ratified the principle of a second period of application of the protocol and started negotiations for a new international treaty supposed to come into effect in 2020.

  3. The Kyoto Protocol : a Review and Perspectives

    OpenAIRE

    Böhringer, Christoph

    2003-01-01

    International concern about climate change has led to the Kyoto Protocol, negotiated in 1997, which contains legally binding emission targets for industrialized countries to be achieved during the commitment period 2008-2012. While proponents of the Protocol celebrate it as a breakthrough in international climate policy, opponents criticize that its approach, namely setting targets and timetables for emission reductions, is seriously flawed. This paper provides a critical assessment of the Pr...

  4. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  5. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x or...

  6. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk; Jung; Yongseok; Chang; Jonghoon; Eom; Sungho; Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify ...

  7. Secure Key Management Protocol in WIMAX

    OpenAIRE

    Noudjoud Kahya; Nacira Ghoualmi; Pascal Lafourcade

    2012-01-01

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. ...

  8. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  9. EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2005-01-01

    Fairness is of crucial importance for the exchange protocols via Internet. Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols: Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).

  10. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  11. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  12. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  13. Chain-Chain Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Samia A Ali

    2011-05-01

    Full Text Available Wireless sensor network (WSN is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and security monitoring systems where minimum delay is desirable. Number of protocols has been proposed in the literature for routing. One of such protocols is the cluster based routing protocol LEACH (low energy adaptive clustering hierarchy. LEACH protocol organizes WSN into a set of clusters and a periodic voting for cluster head is performed in order to be evenly distributed among all the sensors of the WSN. This periodical cluster head voting in LEACH, however, consumes an amount of non-negligible energy and other resources. For energy conservation, PEGASIS (power efficient gathering in sensor information systems a near optimal chain-based protocol has been proposed, however, it is faced with the challenge of long delay for the transmitted data. Another routing protocol called CCM (Chain-Cluster based Mixed routing, which is mainly a hybrid of LEACH and PEGASIS is proposed, the consumed energy increases as network size increases. In this paper, we propose an efficient routing protocol called CCBRP (Chain-Chain based routing protocol, it achieves both minimum energy consumption and minimum delay. The CCBRP protocol mainly divides a WSN into a number of chains (Greedy algorithm is used to form each chain as in PEGSIS protocol and runs in two phases. In the first phase, sensor nodes in each chain transmit data to their chain leader nodes in parallel. In the second phase, all chain leader nodes form a chain (also, using Greedy algorithm and choose randomly a leader node then all chain leader nodes send their data to this chosen leader node. This chosen leader node

  14. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  15. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  17. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    Full text: The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. The objective is to provide the basis for gaining assurance of the absence of undeclared nuclear material and activities in a State. Although the Agency conducted field trials of various aspects of implementation of the Additional Protocol, the first actual implementation experience began with the entry into force of Australia's additional protocol in December of 1997. As of late August 2001,21 states have entered into force an additional protocol and another 35 states have signed the additional protocol but not yet entered the agreement into force. Because implementation of the Additional Protocol requires new activities to be carried out by the IAEA, new procedures, guidelines and training have been developed to support these activities. As more experience is gained these documents are being refined and additional ones developed to meet unforeseen needs. In addition, evaluation and follow-up of the expanded information and the results of increased access has required the Safeguards Department to expand and adapt its procedures and mode of operation. The challenge has been in establishing sufficient measures and the necessary infrastructure for consistent application of the additional protocol in such a way that they can be adapted as needed based on Agency experience. Initial development focused on the logistical aspects of implementing these new activities. These activities include the processing, handling and review of additional protocol declarations; planning, conducting and reporting on complementary access activities; and follow-up activities arising from information review or

  18. PERFORMANCE EVALUATION OF VANETS ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Abduladhim Ashtaiwi

    2014-11-01

    Full Text Available Lately, the concept of VANETs (Vehicular Ad hoc Networks has gotten a huge attention as more wireless communication technologies becoming available. Such networkis expected to be one of the most valuable technology for improving efficiency and safety of the future transportation. Vehicular networks are characterized by high mobility nodes which pose many communication challenging problems. In vehicular networks, routing Collision Avoidance Messages (CAMs among vehicles is a key communication problem.Failure in routing CAMs to their intended destination within the time constraint can render these messages useless. Many routing protocols have been adapted for VANETs, such as DSDV (Destination Sequenced Distance Vector, AODV (Ad-hoc On demand Distance Vector, and DSR (Dynamic Source Routing. This work compares the performance of those routing protocols at different driving environments and scenarios created by using the mobility generator (VanetMobiSim and network simulator(NS2. The obtained results at different vehicular densities, speeds, road obstacles, lanes, traffic lights, and transmission ranges showed that on average AODV protocol outperforms DSR and DSDV protocols in packet delivery ratio and end-toend delay. However, at certain circumstances (e.g., at shorter transmission ranges DSR tends to have better performance than AODV and DSDV protocols.

  19. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  20. Economics of the Kyoto Protocol for Russia

    Energy Technology Data Exchange (ETDEWEB)

    Golub, D.D.; Strukova, E. [Environmental Defense, Washington, DC (United States)

    2004-07-01

    The authors propose a careful analysis of the economic consequences of the Kyoto Protocol for Russian economic recovery. They review a different GHG forecasts for Russia and develop a new forecast for uncertain GDP growth and the changing elasticity of GHG emissions per GDP. As the rate of growth remains uncertain, elasticity could change over time, as well as the fuel mix. They apply the Monte-Carlo method to simulate these uncertainties and to produce a reasonable interval for CO{sub 2} emissions in 2010. The probability of Russia exceedings its Kyoto emissions budget is essentially zero. They also discuss the benefits for Russia from the Kyoto Protocol, and more generally from the implementation of GHG mitigation policy. Ancillary benefits from Kyoto Protocol implementation will bring essential reductions in risk to human health. On the other hand, potential negative changes in the fuel mix and GDP structure, as well as a slowing of the innovation process, could exacerbate the existing health problems. Alternatives to the Kyoto Protocol may bring much tougher commitments to Russia. In conclusion the Kyoto Protocol is the best possible deal for Russia. 24 refs., 4 figs., 5 tabs.

  1. Semen cryopreservation protocols of Mangalarga Marchador stallions

    Directory of Open Access Journals (Sweden)

    Marcela Leite Candeias

    2012-09-01

    Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio® and two filling techniques (0.25 and 0.50 mL straws in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions between the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s, straight line velocity (µm/s, track velocity (µm/s and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.

  2. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  3. WDM network and multicasting protocol strategies.

    Science.gov (United States)

    Kirci, Pinar; Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  4. Eccentricity in Zone Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    Mrs Komal Nair

    2012-06-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a decentralized network of autonomous mobile nodes, able to communicate with each other over wireless links. Due to the mobility of the nodes, the topology ofthe network changes spontaneously, therefore use of conventional routing tables maintained at fixed points (routers is not suggested. Such a network may operate in a standalone fashion. There are variousrouting protocols available for MANETs. The most popular ones are DSR, DSDV and ZRP .The zone routing protocol (ZRP is a hybrid routing protocol that proactively maintains routes within a localregion of the network. ZRP can be configured for a particular network through adjustment of a single parameter, the routing zone radius. In this paper, we address the issue of configuring the ZRP to providethe best performance for a particular network at any time with the concept of eccentricity. The results illustrate the important characteristics of different protocols based on their performance and thus suggest some improvements in the respective protocol. The tools used for the simulation are NS2 which is the main simulator, NAM (Network Animator and Tracegraph which is used for preparing the graphs from the trace files.

  5. Manet Load Balancing Parallel Routing Protocol

    Directory of Open Access Journals (Sweden)

    Hesham Arafat Ali

    2012-07-01

    Full Text Available In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path routing, but it always has a problem that the discovered paths may be not 100% disjoint and sending data is done in only one path until it's broken; the discovery of multiple paths also generates more overhead on the network. Load Balancing Parallel Routing Protocol [LBPRP] tried to solve previous multi path problems, distributing traffic among multiple paths sending data in parallel form as it uses all paths in the same time. We employed a simple test scenario to be sure of proposed model efficiency and to validate the proposed Load Balancing Parallel Routing Protocol. [LBPRP] will achieve load balancing in sending data, decreasing the end-to-end delay and increasing the packet delivery ratio and throughput, thus the performance of multi-path routing protocols can be improved consequently.

  6. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  7. Operational protocols for controlling accelerator equipment

    International Nuclear Information System (INIS)

    The equipment used to operate an accelerator is varied. However, the different devices may be divided into a limited number of classes for which operational protocols can be defined. Operational protocols permit: (i) a uniform operation, (ii) a clear definition of responsibility between the various specialists, (iii) independent development of programs and use of the most appropriate technology, (iv) the change of hardware and the transportability of software, and (v) the fabrication of devices by industry for general use. An operational protocol should be independent of any given control system and it must not be confused with a transmission protocol. As a first step, one defines an operational model of the device to be controlled. The model must represent a high-level description of the device as seen by the user. It will be characterized by a set of parameters and a set of rules. Although the particular requirements of specialists are not included in the operational protocol, allowances should be made for them. Emphasis will be placed on studies carried out on power converters and beam instrumentation. A general-purpose control message architecture is reported. (orig.)

  8. Operational protocols for controlling accelerator equipment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, R.; Baribaud, G.; Benincasa, G.P.; Burla, P.; Casalegno, L.; Coudert, G.; Gelato, G.; Kuhn, H.K.; Saban, R.; Spinks, A. (European Organization for Nuclear Research, Geneva (Switzerland). LEP Div.)

    1990-08-01

    The equipment used to operate an accelerator is varied. However, the different devices may be divided into a limited number of classes for which operational protocols can be defined. Operational protocols permit: (i) a uniform operation, (ii) a clear definition of responsibility between the various specialists, (iii) independent development of programs and use of the most appropriate technology, (iv) the change of hardware and the transportability of software, and (v) the fabrication of devices by industry for general use. An operational protocol should be independent of any given control system and it must not be confused with a transmission protocol. As a first step, one defines an operational model of the device to be controlled. The model must represent a high-level description of the device as seen by the user. It will be characterized by a set of parameters and a set of rules. Although the particular requirements of specialists are not included in the operational protocol, allowances should be made for them. Emphasis will be placed on studies carried out on power converters and beam instrumentation. A general-purpose control message architecture is reported. (orig.).

  9. Open Core Protocol (OCP) Clock Domain Crossing Interfaces

    DEFF Research Database (Denmark)

    Herlev, Mathias; Poulsen, Christian Keis; Sparsø, Jens

    2014-01-01

    The open core protocol (OCP) is an openly licensed configurable and scalable interface protocol for on-chip subsystem communications. The protocol defines read and write transactions from a master towards a slave across a point-to-point connection and the protocol assumes a single common clock. T...

  10. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    OpenAIRE

    Niekerk, van, M.; H. Gunnink; Reenen, van, A Alexander

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  11. Self Fault-Tolerance of Protocols: A Case Study

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions.In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.

  12. The Decentralized Non-Blocking Atomic Commitment Protocol

    OpenAIRE

    Guerraoui, R.; Schiper, A.

    1995-01-01

    In a transactional system, an atomic commitment protocol ensures that for any transaction, all data managers agree on the same outcome: commit or abort. A non-blocking atomic commitment protocol enables an outcome to be decided at every correct data manager despite the failure of others. It is well known that the famous Two Phase Commit protocol (2PC) is a blocking protocol, whereas the Three Phase Commit protocol (3PC) is a non-blocking protocol. Both protocols are centralized. In t...

  13. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  14. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  15. Efficient Controlled Quantum Secure Direct Communication Protocols

    Science.gov (United States)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  16. Chapter 15: Commercial New Construction Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  17. Implications of international protocols on energy markets

    International Nuclear Information System (INIS)

    Ratification of the Kyoto Protocol will have significant medium and long term implications for the economies of Annex B and non-Annex B countries. It is shown that the adoption of a system of internationally tradable emission quotas would result in three 'dividends' compared with an outcome where Article 17 trading - relating to emissions trading - is prohibited. First, trading would improve the environmental effectiveness of the protocol because the extent of carbon dioxide equivalent leakage would be reduced. Second, the overall cost of meeting the agreed Annex B targets would be reduced thus leading to greater certainty that the protocol will be implemented in full. Third, a disparity in the differential impacts of Annex B abatement policies on different developing countries would be reduced under emissions trading, leading to a more equitable outcome for these countries

  18. A Review: Multi Protocol Label Switching (Mpls

    Directory of Open Access Journals (Sweden)

    Rashed Qayoom Shawl,

    2014-01-01

    Full Text Available The demand for technology called MPLS is increasing day by day in most internet service provider networks. Majority of the carriers are deploying MPLS in their backbone networks to facilitate a number of services and applications such as virtual private networks, quality of service (QoS and traffic engineering. MPLS is a scalable, protocol-independent protocol. MPLS allows for creating end-to-end circuits across any type of transport medium using any protocol. The primary benefit of MPLS is to eliminate the dependence on a particular OSI model data-link layer technology such as asynchronous transfer mode (ATM, Frame Relay or Ethernet and eliminates the need for multiple layer-2 networks to satisfy different types of traffic. This paper reflects a detailed overview on MPLS with its architectural terminology, working and the services that it offers.

  19. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek......'s spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of...... messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  20. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek......'s spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of...... messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  1. An Anonymous Secure Routing Using OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Osiers Gyamfuah Grace

    2013-01-01

    Full Text Available Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET. Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated into the existing Optimized Link State Routing protocol (OLSR, it is expected that security services such as authentication, data integrity, privacy and confidentiality will be provided. This work proposes to protect the network against active attacks such as impersonation and modification.

  2. Framework Design of Secure Cloud Transmission Protocol

    Directory of Open Access Journals (Sweden)

    Dinesha H A

    2013-01-01

    Full Text Available Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, we propose secure cloud transmission protocol design. This framework design details will help us in developing a secure protocol for the customers who are using cloud computing technologies over insecure internet. In this paper we discuss: i Overview model of proposed secure cloud transmission system in internet ii Security requirements iii roles and responsibilities of secure transmission protocol in OSI and iv Framework Design of secure cloud transmission.

  3. Chapter 22: Compressed Air Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  4. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    Directory of Open Access Journals (Sweden)

    Campagne Fabien

    2008-02-01

    Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT

  5. Automated Theorem Proving for Cryptographic Protocols with Automatic Attack Generation

    OpenAIRE

    Jan Juerjens; Thomas A. Kuhn

    2016-01-01

    Automated theorem proving is both automatic and can be quite efficient. When using theorem proving approaches for security protocol analysis, however, the problem is often that absence of a proof of security of a protocol may give little hint as to where the security weakness lies, to enable the protocol designer to improve the protocol. For our approach to verify cryptographic protocols using automated theorem provers for first-order logic (such as e-SETHEO or SPASS), we demonstrate a method...

  6. Performance Comparison of Routing Protocols for Remote Login in MANETs

    OpenAIRE

    VIKAS GOYAL; SHAVETA RANI; PARAMJIT SINGH

    2013-01-01

    Wireless networks are those networks, in which devices are connected without using cables. Thebest example, which comes across in our daily life is mobile phones. MANET has mobile nodes in network,which transfer data packets from source node to destination node; this is possible by routing protocols. Inthis paper, the routing protocols used are - Ad hoc On-Demand Distance Vector (AODV) Protocol,Geographical Routing Protocol (GRP) and Optimized Link State Routing (OLSR) Protocol. The performan...

  7. Interpolation of recurrence and hashing entanglement distillation protocols

    OpenAIRE

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2004-01-01

    We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method how entanglement-assisted distillation protocols can be converted into non-entanglement-assisted protocols with the same yield.

  8. Research on an Improved Wireless Sensor Networks Clustering Protocol

    OpenAIRE

    Zheng-Qiu Lu; Lin-Ge Wang; Jin Shan

    2013-01-01

    Energy consumption of clustering routing protocol is one of the exigent problems needs to solve in wireless sensor networks. Aiming at the uneven energy consumption and unreasonable cluster heads selection in LEACH protocol, a new clustering routing protocol is proposed in this paper including number of cluster heads, cluster head choosing algorithm and network topology. Finally we give some analysis and comparison between the improved protocol and other two protocols, and the results show ...

  9. Comparison of Five Parathyroid Scintigraphic Protocols

    OpenAIRE

    Virpi Tunninen; Pekka Varjo; Jukka Schildt; Aapo Ahonen; Tomi Kauppinen; Irina Lisinen; Anu Holm; Hannu Eskola; Marko Seppänen

    2013-01-01

    Objectives. We compared five parathyroid scintigraphy protocols in patients with primary (pHPT) and secondary hyperparathyroidism (sHPT) and studied the interobserver agreement. The dual-tracer method (99mTc-sestamibi/123I) was used with three acquisition techniques (parallel-hole planar, pinhole planar, and SPECT/CT). The single-tracer method (99mTc-sestamibi) was used with two acquisition techniques (double-phase parallel-hole planar, and SPECT/CT). Thus five protocols were used, resulting ...

  10. Optimal protocols for slowly driven quantum systems.

    Science.gov (United States)

    Zulkowski, Patrick R; DeWeese, Michael R

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing. PMID:26465432

  11. Social Protocols for Agile Virtual Teams

    CERN Document Server

    Picard, Willy

    2011-01-01

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  12. Social Protocols for Agile Virtual Teams

    Science.gov (United States)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  13. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk Jung; Yongseok Chang; Jonghoon Eom; Sungho Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify the above, the current study also implements an EPON model using OPNET as the simulation tool.

  14. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  15. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any......- work, and gives a general pattern for reasoning about independence....

  16. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  17. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  18. A Formal Approach to Protocol Interoperability Testing

    Institute of Scientific and Technical Information of China (English)

    郝瑞兵; 吴建平

    1998-01-01

    Porotocol Interoperability testing is an important means to ensure the interconnection and interoperation between protocol products.In this paper,we proposed a formal approach to protocol interoperability testing based on the operational semantics of Concurrent TTCN.We define Concurrent TTCN's operational semantics by using Labeled Transition System,and describe the interoperability test execution and test verdict based on Concurrent TTCN.This approach is very helpful for the formation of formal interoperability testing theory and construction of general interoperability testing system.

  19. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    OpenAIRE

    Seong-Moo Yoo; Jun Huy Lam; Sang-Gon Lee; Whye Kit Tan

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining...

  20. Secure Bidirectional Communication Protocol without Quantum Channel

    OpenAIRE

    Zhang, Z. J.; Man, Z. X.

    2004-01-01

    In this letter we propose a theoretical deterministic secure direct bidirectional quantum communication protocol by using swapping quantum entanglement and local unitary operations, in which the quantum channel for photon transmission can be discarded, hence any attack with or without eavesdropping or even the destructive attack without scruple is impossible.

  1. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...... authentication goals, the correctness requirements, can be derived from the binding sequence....

  2. Leaf tissue sampling and DNA extraction protocols.

    Science.gov (United States)

    Semagn, Kassa

    2014-01-01

    Taxonomists must be familiar with a number of issues in collecting and transporting samples using freezing methods (liquid nitrogen and dry ice), desiccants (silica gel and blotter paper), and preservatives (CTAB, ethanol, and isopropanol), with each method having its own merits and limitations. For most molecular studies, a reasonably good quality and quantity of DNA is required, which can only be obtained using standard DNA extraction protocols. There are many DNA extraction protocols that vary from simple and quick ones that yield low-quality DNA but good enough for routine analyses to the laborious and time-consuming standard methods that usually produce high quality and quantities of DNA. The protocol to be chosen will depend on the quality and quantity of DNA needed, the nature of samples, and the presence of natural substances that may interfere with the extraction and subsequent analysis. The protocol described in this chapter has been tested for extracting DNA from eight species and provided very good quality and quantity of DNA for different applications, including those genotyping methods that use restriction enzymes. PMID:24415469

  3. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  4. Quantifying information leakage of randomized protocols

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Legay, Axel; Malacaria, Pasquale;

    2015-01-01

    The quantification of information leakage provides a quantitative evaluation of the security of a system. We propose the usage of Markovian processes to model deterministic and probabilistic systems. By using a methodology generalizing the lattice of information approach we model refined attacker...... the Onion Routing protocol....

  5. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30. ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  6. Delta-t protocol specification: working draft

    Energy Technology Data Exchange (ETDEWEB)

    Watson, R.W.

    1981-12-04

    This document is one of a series describing protocols associated with the Livermore Interactive Network Communication System (LINCS) hierarchical architecture. At the heart of LINCS is its basic interprocess communication (LINCS-IPC) service. LINCS-IPC defines a reliable, flow controlled, full duplex, uninterpreted, labeled bit stream communication service. LINCS-IPC is level 4 in the LINCS architecture. Level 3 of LINCS is the Network layer defining an internetwork datagram type service. LINCS-IPC interfaces to User processes that utilize higher level syntactic and semantic conventions for process interaction. The transport service provided by the Delta-t protocol can be considered a sublayer of the LINCS-IPC layer. Delta-t augments the Network level service as required to support LINCS-IPC. This document specifies the services provided by the Delta-t protocol to support LINCS-IPC, the operation of Delta-t, and the services Delta-t requires of the Network level. This document was written to be self-contained but the reader will find it useful to have available for reference the LINCS-IPC and LINCS DeltaGram Network layer protocol specifications. Implementations are underway in Pascal for the PDP-11 running under RT11 and RX11, in BLISS for the VAX running under VMS, in MODEL for the CRAY-1 and CDC 7600 running under NLTSS and LTSS, and for the SEL 32/75 running under PORT.

  7. A Study of MAC Protocols for WBANs

    Directory of Open Access Journals (Sweden)

    Sana Ullah

    2009-12-01

    Full Text Available The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN. A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements.

  8. A study of MAC protocols for WBANs.

    Science.gov (United States)

    Ullah, Sana; Shen, Bin; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements. PMID:22315531

  9. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... general framework for the study of several interesting security properties, and developers, who get a collection of tools that can validate protocols with respect to various aspects of security....... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not. The...... development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA. A...

  10. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  11. Service discovery with routing protocols for MANETs

    Science.gov (United States)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  12. The Kyoto protocol in a global perspective

    Directory of Open Access Journals (Sweden)

    Tjaša Redek

    2009-11-01

    Full Text Available The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, was adopted and entered into force in 2005. But several countries, including the USA, have had doubts about the potential negative consequences of the planned 5% global joint reduction of GHG. However, studies generally show that on a macroeconomic level: (1 welfare loss in terms of GDP and lost growth in EU is low; (2 it differs among economies; and (3 permit trading and permit price (in either global or regional markets is highly correlated with the welfare loss. The main objective of the paper is to describe the attitudes and responses to the Kyoto Protocol from a global perspective. The paper has three objectives. First, to provide an overview of global greenhouse gas emissions and the big drivers behind these emissions. Second, to present where different countries, both developed and less developed countries, such as India, China and the countries of South-east Europe currently stand as regards their efforts to achieve the Kyoto Protocol requirements. Third, to analyse the responses and attitudes to the Kyoto Protocol from a country development perspective.

  13. Integrated Routing Protocol for Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Anshul Verma

    2011-03-01

    Full Text Available In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context oblivious based schemes are only way to enable communication between users. As soon as users become more social, context data spreads in the network, and context based routing becomes an efficient solution. In this paper we design an integrated routing protocol that is able to use context data as soon as it becomes available and falls back to dissemination-based routing when context information is not available. Then, we provide a comparison between Epidemic and PROPHET, these are representative of context oblivious and context aware routing protocols. Our results show that integrated routing protocol is able to provide better result in term of message delivery probability and message delay in both cases when context information about users is available or not.

  14. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.;

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near...

  15. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...

  16. Secure communication protocol for mobile multimedia applications

    OpenAIRE

    Komninos, N.; Honary, B.; Darnell, M.

    2000-01-01

    Data transmission over wireless communication networks is increasing rapidly and security has become a very important issue. The main considerations of secure communication systems are authentication, key distribution, and data transfer. This paper describes a secure communication protocol (SCP), which provides privacy and data integrity for end-to-end data transmission over wireless communication systems.

  17. Measurement Protocols for Optimized Fuel Assembly Tags

    International Nuclear Information System (INIS)

    This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

  18. The braided single-stage protocol for quantum secure communication

    Science.gov (United States)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  19. Adenosine stress protocols for myocardial perfusion imaging

    Directory of Open Access Journals (Sweden)

    Baškot Branislav

    2008-01-01

    Full Text Available Background/Aim. Treadmill test combined with myocardial perfusion scintigraphy (MPS is a commonly used technique in the assessment of coronary artery disease. There are many patients, however, who may not be able to undergo treadmill test. Such patients would benefit from pharmacological stress procedures combined with MPS. The most commonly used pharmacological agents for cardiac stress are coronary vasodilatators (adenosine, dipyridamol and catecholamines. Concomitant low-level treadmill exercise with adenosine pharmacologic stress (AdenoEX during MPS has become commonly used in recent years. A number of studies have demonstrated a beneficial impact of AdenoEX protocol. The aim of the study was, besides introducing into practice the two types of protocols of pharmatological stress test with adenosine, as a preparation for MPS, to compare and monitor the frequency of their side effects to quality, acquisition, as well as to standardize the onset time of acquisition (diagnostic imaging for both protocols. Methods. A total of 130 patients underwent pharmacological stress test with adenosine (vasodilatator. In 108 of the patients we performed concomitant exercise (AdenoEX of low level (50W by a bicycle ergometar. In 28 of the patients we performed Adenosine abbreviated protocol (AdenoSCAN. Side effects of adenosine were followed and compared between the two kinds of protocols AdenoEX and AdenoSCAN. Also compared were image quality and suggested time of acquisition after the stress test. Results. Numerous side effects were found, but being short-lived they did not require any active interventions. The benefit of AdenoEX versus AdenoSCAN included decreased side effects (62% vs 87%, improved safety and patients tolerance, improved target-to-background ratios because of less subdiaphragmatic activity, earlier acquisition, and improved sensitivity. Conclusion. The safety and efficacy of adenosine pharmacological stress is even better with concomitant

  20. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of