WorldWideScience

Sample records for applicable protocol fails

  1. Recommended protocol for failed back surgery syndrome

    Directory of Open Access Journals (Sweden)

    Fakhr Tabatabaei SA

    1996-06-01

    Full Text Available Failed back surgery syndrome (FBSS is many a times an intractable problem confronted in patients with surgical disease of lumbar spine and at the same time is a pressing problem for the physicians as well. This clinical entity is defined as continuation of pain in the lumbar region and lower extremities following surgery of the lumbar spine. Knowledge of the etiological factors and their prevention is the best line of treatment to overcome the evolution of this syndrome. During this study, which was conducted in Imam Khomeini hospital Tehran from the year 1989 till 1990, 43 out of 114 patients developed "FBSS". 23 cases responded to conservative treatment and psychotherapy whereas medical treatment failed to achieve fruitful results in the rest. The latter underwent extensive radiological investigations and repeat surgery. According to this study, we recommend that in the initial management of these patients. The surgeon should observe the dictum of "5-mis" to overcome and minimize the "FBSS" entity

  2. Critical Appraisal of the Milwaukee Protocol for Rabies: This Failed Approach Should Be Abandoned.

    Science.gov (United States)

    Zeiler, Frederick A; Jackson, Alan C

    2016-01-01

    The Milwaukee protocol has been attributed to survival in rabies encephalitis despite a lack of scientific evidence supporting its therapeutic measures. We have reviewed the literature with reference to specific treatment recommendations made within the protocol. Current literature fails to support an important role for excitotoxicity and cerebral vasospasm in rabies encephalitis. Therapies suggested in the Milwaukee protocol include therapeutic coma, ketamine infusion, amantadine, and the screening/prophylaxis/management of cerebral vasospasm. None of these therapies can be substantiated in rabies or other forms of acute viral encephalitis. Serious concerns over the current protocol recommendations are warranted. The recommendations made by the Milwaukee protocol warrant serious reconsideration before any future use of this failed protocol. PMID:26639059

  3. Mammascintigraphy: fundamentals, protocols, clinical application

    International Nuclear Information System (INIS)

    Radiopharmaceuticals, methods and results of clinical application of mammascintigraphy are reviewed. The main advantage of mammascintigraphy is its higher (at least 90%) specificity in comparison with X-ray mammography, possibility of using it in patients with X-ray dense gland, predicting cancer metastases and follow-up of tumor regression during chemotherapy. Mammascintigraphy is an effective reliable method of accurate diagnosis of breast cancer, which should be introduced in clinical practice of Russian breast cancer control centers as soon as possible

  4. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  5. Secure authentication protocol for Internet applications over CATV network

    Science.gov (United States)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  6. Application Protocol Design for Collaborative Learning

    Directory of Open Access Journals (Sweden)

    Joung-Souk Sung

    2009-12-01

    Full Text Available This presentation will describe the effort to construct an effective educational support environment and to develop meaningful educational applications, This system is a framework supporting interactive collaboration which enables both teachers and students to interact in real-time from remote sites. The purpose of this collaboration is to bring interactive multimedia learning in real-time. In order to induce collaborative learning, this paperproposes protocol design process that shares knowledge awareness information for learning environments. The protocol helps learner to mediate and recognize collaborators in the shared knowledge space. We are developing an open-ended collaborative learning supportsystem, which is called prototype system for protocol design, and facilities to share individual knowledge and to learn through collaboration. This system architecture can be viewed asdivided in four logical parts: the infrastructure, the service functions, the advanced service functions and the application. The session management is creates/destroys the sessions and performs the functions controlling the QOS by detaching the network load. Session manager include: session control, floor control, media instance control, packet interpreter, event interpreter, media server instance, media interface, network interface private applicationinterface and media server control.

  7. Feature Analysis of STEP Application Protocol and its Application

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    This paper uses semantic data modelling and CAD/CAPP/CAM integration to analyze the features defined in the STEP AP214, its characteristics of definition and distribution, and its influence on the complexity of CAD/CAPP/CAM application integration. A framework is developed for applications of CAD/CAPP/CAM integration based on the STEP to reduce the complexity of integration implementation. Two application program interfaces (API), namely, application protocol API and application API, are developed. The frameworks hierarchy structure and the application program interfaces between the layers make the integration of applications easier.

  8. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  9. The Research and Application Design of SDL Protocol

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Aiming at overcoming the disadvantages in the Simple Data Link(SDL) protocol, we study and modify the protocol mechanism, which enhances the flexibility in carrying the packets of various network layer protocols and improves the ability to correct errors. We research the error check and error correction of CRC and the application of MPLS labels in the SDL protocol. Furthermore, we provide a method of CRC correction and application of MPLS labels in the SDL protocol. Finally, we present a scheme of realizing the SDL protocol.

  10. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  11. On Runtime Adaptation of Application-Layer Multicast Protocol Parameters

    OpenAIRE

    Hübsch, Christian; Mayer, Christoph P.; Waldhorst, Oliver P.

    2010-01-01

    Reasonable choice of protocol parameters is crucial for the successful deployment of overlay networks fulfilling given service quality requirements in next generation networks. Unfortunately, changing network conditions, as well as changing application and user requirements may invalidate an initial parameter choice during the lifetime of an overlay. To this end, runtime adaptation of protocol parameters seems to be a promising solution-however, it is not clear if protocol parameters can be a...

  12. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  13. Secure communication protocol for mobile multimedia applications

    OpenAIRE

    Komninos, N.; Honary, B.; Darnell, M.

    2000-01-01

    Data transmission over wireless communication networks is increasing rapidly and security has become a very important issue. The main considerations of secure communication systems are authentication, key distribution, and data transfer. This paper describes a secure communication protocol (SCP), which provides privacy and data integrity for end-to-end data transmission over wireless communication systems.

  14. Failing Failed States

    DEFF Research Database (Denmark)

    Holm, Hans-Henrik

    2002-01-01

    from inaction. Often, the media are blamed. Politicians complain about the media when they interfere (the CNN effect), and when they do not. This article looks at how the media do cover failing states. Sierra Leone and Congo are used as examples. The analysis shows that there is little independent...

  15. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  16. A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations

    OpenAIRE

    Monnet, Sébastien; Morin, Christine; Badrinath, Ramamurthy

    2004-01-01

    Code coupling applications can be divided into communicating modules, that may be executed on different clusters in a cluster federation. As a cluster federation comprises of a large number of nodes, there is a high probability of a node failure. We propose a hierarchical checkpointing protocol that combines a synchronized checkpointing technique inside clusters and a communication-induced technique between clusters. This protocol fits to the characteristics of a cluster federation (large num...

  17. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  18. Extensible Authentication Protocol Overview and Its Applications

    Science.gov (United States)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  19. Characteristics of orphan drug applications that fail to achieve marketing approval in the USA.

    Science.gov (United States)

    Heemstra, Harald E; Leufkens, Hubert G M; Rodgers, R P Channing; Xu, Kui; Voordouw, Bettie C G; Braun, M Miles

    2011-01-01

    The US Orphan Drug Act has fostered the development of drugs for patients with rare diseases by granting 'orphan designations', although several orphan drugs for which a marketing application has been submitted to the FDA have failed to obtain approval. This study identified the clinical trial design, the level of experience of the sponsor and the level of interaction with the FDA to be associated with non-approval. Sponsors, therefore, should engage in dialogue with the FDA and thoughtfully design pivotal clinical trials in accordance with FDA guidance documents. PMID:21094692

  20. On the design of application protocols

    NARCIS (Netherlands)

    Sinderen, van Marten Jelle

    1995-01-01

    In the last decades, much effort has been spent on the design and provision of sophisticated communication infrastructures. The development of end-user oriented distributed system applications, leaning on top of these communication infrastructures, so far has attracted little attention. This is regr

  1. Network Coding Protocols for Data Gathering Applications

    DEFF Research Database (Denmark)

    Nistor, Maricica; Roetter, Daniel Enrique Lucani; Barros, João

    2015-01-01

    Tunable sparse network coding (TSNC) with various sparsity levels of the coded packets and different feedback mechanisms is analysed in the context of data gathering applications in multi-hop networks. The goal is to minimize the completion time, i.e., the total time required to collect all data...... packets from the nodes while maintaining the per packet overhead at a minimum. We exploit two types of feedback, (1) the explicit feedback sent deliberately between nodes and (2) the implicit feedback emerged when a node hears its neighbour transmissions. Analytical bounds for a line network are derived...

  2. Virtual reality applications to agoraphobia: a protocol.

    Science.gov (United States)

    Cárdenas, Georgina; Muñoz, Sandra; González, Maribel; Uribarren, Guillermo

    2006-04-01

    Recently, educators and instructional designers have focused on the development and implementation of virtual learning environments that effectively combine theoretical and applied knowledge to teach university students. One of the trusts of the Psychology Virtual Teaching Laboratory in collaboration with the IXTLI observatory is to develop dissemination programs to promote the insertion of virtual reality (VR) technologies applied to rehabilitation in their clinical practice. This paper describes the development of (1) agoraphobia VR learning objects to be use as a teaching support tools in class and (2) a multimedia teaching program that incorporate digital video and VR scenarios address to students in the field of mental health. Promotion among professors and students about the use of this technology will allow us to initiate research in our country as well as to validate contextualized applications for our culture, therefore contributing with new advances in this field. PMID:16640489

  3. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  4. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  5. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  6. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  7. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  8. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  9. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Directory of Open Access Journals (Sweden)

    Alvaro Carvajal-Flórez

    2016-04-01

    Full Text Available ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS of the American Board of Orthodontics (ABO. Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG consisted of 17 patients (19.88 ± 4.4 years old treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old selected by stratified randomization without finishing intervention (CG. Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048, respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8 (p = 0.009 and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6 (p = 0.007. Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8 (p = 0.62 and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9 (p = 0.65. Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system.

  10. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Science.gov (United States)

    Carvajal-Flórez, Alvaro; Barbosa-Lis, Diana María; Zapata-Noreña, Oscar Arturo; Marín-Velásquez, Julissa Andrea; Afanador-Bayona, Sergio Andrés

    2016-01-01

    ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS) of the American Board of Orthodontics (ABO). Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG) consisted of 17 patients (19.88 ± 4.4 years old) treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old) selected by stratified randomization without finishing intervention (CG). Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048), respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8) (p = 0.009) and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6) (p = 0.007). Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8) (p = 0.62) and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9) (p = 0.65). Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system. PMID:27275620

  11. Is the Pass/Fail System Applicable to a Medical School in Korea?

    OpenAIRE

    Mee Young Kim

    2007-01-01

    To determine whether a pass/fail system is more appropriate for medical education instead of a grade-based system, a survey of medical students and faculty members of Hallym University, Korea, was taken. A questionnaire was delivered to 54 junior students and 36 faculty members from a medical school in Korea and analyzed. Of these participants, 37.7% of students and 36.1% of faculty agreed to the pass/fail system, while 28.3% of students and 52.8% of faculty objected to it. The most frequent ...

  12. Reputation-based Incentive Protocols in Crowdsourcing Applications

    CERN Document Server

    Zhang, Yu

    2011-01-01

    Crowdsourcing websites (e.g. Yahoo! Answers, Amazon Mechanical Turk, and etc.) emerged in recent years that allow requesters from all around the world to post tasks and seek help from an equally global pool of workers. However, intrinsic incentive problems reside in crowdsourcing applications as workers and requester are selfish and aim to strategically maximize their own benefit. In this paper, we propose to provide incentives for workers to exert effort using a novel game-theoretic model based on repeated games. As there is always a gap in the social welfare between the non-cooperative equilibria emerging when workers pursue their self-interests and the desirable Pareto efficient outcome, we propose a novel class of incentive protocols based on social norms which integrates reputation mechanisms into the existing pricing schemes currently implemented on crowdsourcing websites, in order to improve the performance of the non-cooperative equilibria emerging in such applications. We first formulate the exchange...

  13. Scalable Hybrid Speech Codec for Voice over Internet Protocol Applications

    Directory of Open Access Journals (Sweden)

    Manas Ray

    2016-04-01

    Full Text Available With the advent of various web-based applications and the fourth generation (4G access technology, there has been an exponential growth in the demand of multimedia service delivery along with speech signals in a voice over internet protocol (VoIP setup. Need is felt to fine-tune the conventional speech codecs deployed to cater to the modern environment. This fine-tuning can be achieved by further compressing the speech signal and to utilize the available bandwidth to deliver other services. This paper presents a scalable -hybrid model of speech codec using ITU-T G.729 and db10 wavelet. The codec addresses the problem of compression of speech signal in VoIP setup. The performance comparison of the codec with the standard codec has been performed by statistical analysis of subjective, objective and quantifiable parameters of quality desirable from the codec deployed in VoIP platforms.

  14. A nonparametric urn-based approach to interacting failing systems with an application to credit risk modeling

    CERN Document Server

    Cirillo, Pasquale; Muliere, Pietro

    2010-01-01

    In this paper we propose a new nonparametric approach to interacting failing systems (FS), that is systems whose probability of failure is not negligible in a fixed time horizon, a typical example being firms and financial bonds. The main purpose when studying a FS is to calculate the probability of default and the distribution of the number of failures that may occur during the observation period. A model used to study a failing system is defined default model. In particular, we present a general recursive model constructed by the means of inter- acting urns. After introducing the theoretical model and its properties we show a first application to credit risk modeling, showing how to assess the idiosyncratic probability of default of an obligor and the joint probability of failure of a set of obligors in a portfolio of risks, that are divided into reliability classes.

  15. Two-to-one quantum teleportation protocol and its application

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.Y. [Department of Computer Science and Information Engineering, National University of Kaohsiung, Taiwan (China); Hsueh, C.C. [Department of Information Engineering, I-Shou University, Kaohsiung County, Taiwan (China)], E-mail: jrcheng0203@gmail.com; Hsu, C.C. [Department of Information Engineering, I-Shou University, Kaohsiung County, Taiwan (China)

    2008-06-15

    In this paper, we propose a two-to-one quantum teleportation protocol with three-particle entangled states. Two senders teleport the product of their quantum states to one receiver. The quantum product is of two types. The receiver will recover one type with probability 1/2 . We further apply our protocol to send the message secretly. The receiver can recover the original message with probability 1-(1/2 ){sup k} after performing our protocol k times.

  16. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  17. Selection application for platforms and security protocols suitable for wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Moeller, S; Newe, T [Electronic and Computer Engineering, University of Limerick (Ireland); Lochmann, S, E-mail: stefan.moeller@ul.i [Fachbereich Elektrotechnik und Informatik, Hochschule Wismar (Germany)

    2009-07-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  18. Failing Decision

    DEFF Research Database (Denmark)

    Knudsen, Morten

    2014-01-01

    deals not with traffic delays, but with failing decisions in organizations. The assumption of this chapter is that failing decisions today are as normal as delayed trains. Instead of being the exception, failure is part of the everyday reproduction of organizations – as an uncontrolled effect but also...... also propelled by an interest in failure as one way of improving understanding of present-day decision making in organizations.......Recently the Danish subway trains have begun to announce “on time” when they arrive at a station on time. This action reflects a worrying acceptance of the normality of failure. If trains were generally expected to be on time, there would be no reason to – triumphantly – announce it. This chapter...

  19. Leakproof secret sharing protocols with applications to group identification scheme

    Institute of Scientific and Technical Information of China (English)

    TANG ChunMing; GAO ShuHong

    2012-01-01

    In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret K.In the reconstruction process,the individual shares and the secret key K are revealed,hence K is shared once only. In this paper,we firstly give the definition of leakproof secret sharing scheme which is composed of a distribution protocol and a proof protocol,then propose two leakproof secret sharing protocols,a computationally secure protocol and an information-theoretically secure protocol.In our protocols,t or more participants can jointly prove that they hold the secret K by using a multi-prover zero-knowledge argument of knowledge.As a result,the secret K will be shared for as many times as desired.Furthermore,each participant can detect the dealer in the distribution protocol from cheating,and any verifier can prevent non-qualified set of participants in proof protocol from cheating.As an example of the practical impact of our work we use our techniques to construct group identification schemes with zero-knowledge.

  20. Application Framework with Abstractions for Protocol and Agent Role

    DEFF Research Database (Denmark)

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent...

  1. Rate Compatible Protocol for Information Reconciliation: An application to QKD

    CERN Document Server

    Elkouss, David; Lancho, Daniel; Martin, Vicente

    2010-01-01

    Information Reconciliation is a mechanism that allows to weed out the discrepancies between two correlated variables. It is an essential component in every key agreement protocol where the key has to be transmitted through a noisy channel. The typical case is in the satellite scenario described by Maurer in the early 90's. Recently the need has arisen in relation with Quantum Key Distribution (QKD) protocols, where it is very important not to reveal unnecessary information in order to maximize the shared key length. In this paper we present an information reconciliation protocol based on a rate compatible construction of Low Density Parity Check codes. Our protocol improves the efficiency of the reconciliation for the whole range of error rates in the discrete variable QKD context. Its adaptability together with its low interactivity makes it specially well suited for QKD reconciliation.

  2. Why electricity deregulation is likely to fail: An explanation with an application to Israel

    Energy Technology Data Exchange (ETDEWEB)

    Tishler, Asher; Woo, Chi-Keung

    2005-12-15

    In this paper we contend that electricity deregulation likely fails because of a fundamental, but so far ignored, reason. In particular, a deregulated electricity market cannot have too many producers because they will not be able to recover their investment costs. Nor can it have too few producers because the resulting market price will likely exceed the regulated rate. If constrained by the financial viability of privately owned generators and an overarching goal of unregulated market price not exceeding the regulated rate, the set of feasible numbers of producers in the competitive market can be very small, and at times empty. Our theoretical prediction applies to deregulation of other industries with large fixed and sunk costs (e.g., gas transportation, electricity transmission and distribution, local telecom networks, ports, railways, etc.). We show that a large improvement in the operational efficiency of the deregulated industry is a necessary condition for a successful deregulation of the industry. Unfortunately, operation improvement in electricity generation is limited because fuel (e.g., coal, oil, natural gas, and liquefied natural gas) and generation equipment (e.g., turbines, transformers, and cables), which constitute about 80% of the total cost of electricity generation, are commodities traded in a competitive world market. Thus, cost savings due to deregulation in the electricity generation market mainly come from efficiency improvement in capacity investment and variable input use of labor and O and M. Unless the regulated integrated utility has been investing inefficiently in surplus capacity, such savings, mainly in labor and O and M, are unlikely to produce more than a 10% reduction in total generation cost. For this reason and based on the experience to date, we caution against deregulation in regions that currently have a regulated electricity sector (e.g., China, India, Hong Kong, Israel, Africa, and many parts of North America). Our

  3. Why electricity deregulation is likely to fail: An explanation with an application to Israel

    International Nuclear Information System (INIS)

    In this paper we contend that electricity deregulation likely fails because of a fundamental, but so far ignored, reason. In particular, a deregulated electricity market cannot have too many producers because they will not be able to recover their investment costs. Nor can it have too few producers because the resulting market price will likely exceed the regulated rate. If constrained by the financial viability of privately owned generators and an overarching goal of unregulated market price not exceeding the regulated rate, the set of feasible numbers of producers in the competitive market can be very small, and at times empty. Our theoretical prediction applies to deregulation of other industries with large fixed and sunk costs (e.g., gas transportation, electricity transmission and distribution, local telecom networks, ports, railways, etc.). We show that a large improvement in the operational efficiency of the deregulated industry is a necessary condition for a successful deregulation of the industry. Unfortunately, operation improvement in electricity generation is limited because fuel (e.g., coal, oil, natural gas, and liquefied natural gas) and generation equipment (e.g., turbines, transformers, and cables), which constitute about 80% of the total cost of electricity generation, are commodities traded in a competitive world market. Thus, cost savings due to deregulation in the electricity generation market mainly come from efficiency improvement in capacity investment and variable input use of labor and O and M. Unless the regulated integrated utility has been investing inefficiently in surplus capacity, such savings, mainly in labor and O and M, are unlikely to produce more than a 10% reduction in total generation cost. For this reason and based on the experience to date, we caution against deregulation in regions that currently have a regulated electricity sector (e.g., China, India, Hong Kong, Israel, Africa, and many parts of North America). Our

  4. APPLICATION OF THE HART PROTOCOL FOR COMMUNICATION WITH SMART FIELD DEVICES

    OpenAIRE

    MULAOSMANOVIC ADNAN M.

    2015-01-01

    Smart instrumentation protocols are designed for applications where data is collected from instruments, sensors and actuators by digital communication technology. The HART protocol is a typical smart instrumentation Fieldbus. More than 40 million HART devices are installed worlwide, and the HART technology is the most widely usef field communication protocol for intelligent process instrumentation. Two communication channels supported by HART devices are the current loop 4-20 mA, and the HART...

  5. Though active on RINm5F insulinoma cells and cultured pancreatic islets, recombinant IL-22 fails to modulate cytotoxicity and disease in a protocol of streptozotocin-induced experimental diabetes.

    Directory of Open Access Journals (Sweden)

    Anika eBerner

    2016-01-01

    Full Text Available Interleukin (IL-22 is a cytokine displaying tissue protective and pro-regenerative functions in various preclinical disease models. Anti-bacterial, pro-proliferative, and anti-apoptotic properties mediated by activation of the transcription factor signal transducer and activator of transcription (STAT-3 are key to biological functions of this IL-10 family member. Herein, we introduce RINm5F insulinoma cells as rat ß-cell line that, under the influence of IL-22, displays activation of STAT3 with induction of its downstream gene targets Socs3, Bcl3, and Reg3ß. In addition, IL-22 also activates STAT1 in this cell type. To refine those observations, IL-22 biological activity was evaluated using ex vivo cultivated murine pancreatic islets. In accord with data on RINm5F cells, islet exposure to IL-22 activated STAT3 and upregulation of STAT3-inducible Socs3, Bcl3, and STEAP4 was evident under those conditions. As these observations supported the hypothesis that IL-22 may exert protective functions in toxic ß-cell injury, application of IL-22 was investigated in murine multiple-low-dose streptozotocin (STZ-induced diabetes. For that purpose, recombinant IL-22 was administered thrice either immediately before and at disease onset (at d4, d6, d8 or closely thereafter (at d8, d10, d12. These two IL-22-treatment periods coincide with two early peaks of ß-cell injury detectable in this model. Notably, none of the two IL-22-treatment strategies affected diabetes incidence or blood glucose levels in STZ-treated mice. Moreover, pathological changes in islet morphology analyzed 28 days after disease induction were not ameliorated by IL-22 administration. Taken together, despite being active on rat RINm5F insulinoma cells and murine pancreatic islets, recombinant IL-22 fails to protect pancreatic ß-cells in the tested protocols from toxic effects of STZ and thus is unable to ameliorate disease in the widely used model of STZ-induced diabetes.

  6. Application of Bousinesq's and Westergaard's formulae in analysing foundation stress distribution for a failed telecommunication mast

    CERN Document Server

    Ojedokun, Olalekan Yinka

    2012-01-01

    The concurrent foundation failure of telecommunication masts in Nigeria and all over the world which endanger the lives and properties of residents situated within the fall distance of the telecommunication mast are a thing of great concern. In this study, a GSM mast that underwent foundation failure at Ibadan, Oyo State, Nigeria was critically examined with a view to providing engineering solution. The soil investigation at the global system for mobile communications (GSM) telecommunication tower comprised of laboratory tests: sieve analysis, Atterberg limits and moisture content tests were carried out on the soil samples obtained while Dutch cone penetrometer test was performed on the site to a depth of refusal to determine the allowable bearing pressure at various depths of the soil. The application of Boussineq's and Westergard's formulae for point loads using Java programme to simulate and compute the stress distribution at various predetermined depths showed the stress distribution pattern beneath the f...

  7. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  8. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  9. Protocol data dependencies with an application in conformance test generation

    NARCIS (Netherlands)

    Kwast, Erik

    2001-01-01

    Computer and Telecommunication networks are intended to exchange and transport in- formation in electronic form. Usually, these networks are built by connecting systems of dierent vendors. In order to allow for the exchange of information between such systems, communication protocols are developed a

  10. Application of a radiometric inventory protocol in radiodiagnostics facilities

    International Nuclear Information System (INIS)

    A radiometric study was carried out in two Radiodiagnostic Units, with seven rooms being assessed. Methodology of the Radiodiagnostics Quality Control Protocol ARCAL XLIX (Cooperation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean) of the International Atomic Energy Agency (IAEA) [1] was used.From radiation protection viewpoint, effective dose rates on surface for different relevant positions were calculated.The eighty-five percent (85%) of assessed positions showed effective dose rates within limit values established in the ARCAL XLIX Protocol. Nevertheless, occupationally-exposed personnel (OEP) placed at position A (controlled area)[2] -one meter distant from the phantom- was found to be exceeding by 7 the ARCAL XLIX advised values

  11. HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS

    Directory of Open Access Journals (Sweden)

    Pandeeswaran Chelliah

    2014-05-01

    Full Text Available In this paper a H-MAC protocol (Hybrid Medium Access Control protocol has been proposed, which is an energy efficient and low latency MAC protocol which uses node ID method to assign priority for certain wireless sensor nodes that are assumed to be present in critical loops for an industrial process control domain. H-MAC overcomes some of the limitations in the existing approaches. In the case of industrial automation scenario, certain sensor loops are found to be time critical, where data’s have to be transferred without any further delay, as failure in immediate transmission leads to catastrophic results for humans as well as machinery in industrial domain. The proposed H-MAC protocol is simulated in NS2 environment, from the result it is observed that the proposed protocol provides better performance compared to the conventional MAC protocols mentioned in the recent literature for the conceded problem. A MAC protocol which provides both energy saving mechanism and that can handle emergency situation is the most desired for any industry. In any industry time and mission critical scenarios requires strict timeliness and reliability along with the energy efficiency. However there are dynamic and harsh environmental conditions for which the MAC protocol must survive and do transmission accordingly. The dynamic changes in topology must also be adapted so that the nodes are in constant link to the destination. Most of the existing MAC protocols have been identified as they face a number of limitations for industrial application domain.

  12. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    Science.gov (United States)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  13. A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks

    CERN Document Server

    Cherian, Mary

    2012-01-01

    The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring context aware physical environments for critical applications.

  14. Modelling a New Product Model on the Basis of an Existing STEP Application Protocol

    Directory of Open Access Journals (Sweden)

    B.-R. Hoehn

    2005-01-01

    Full Text Available During the last years a great range of computer aided tools has been generated to support the development process of various products. The goal of a continuous data flow, needed for high efficiency, requires powerful standards for the data exchange. At the FZG (Gear Research Centre of the Technical University of Munich there was a need for a common gear data format for data exchange between gear calculation programs. The STEP standard ISO 10303 was developed for this type of purpose, but a suitable definition of gear data was still missing, even in the Application Protocol AP 214, developed for the design process in the automotive industry. The creation of a new STEP Application Protocol or the extension of existing protocol would be a very time consumpting normative process. So a new method was introduced by FZG. Some very general definitions of an Application Protocol (here AP 214 were used to determine rules for an exact specification of the required kind of data. In this case a product model for gear units was defined based on elements of the AP 214. Therefore no change of the Application Protocol is necessary. Meanwhile the product model for gear units has been published as a VDMA paper and successfully introduced for data exchange within the German gear industry associated with FVA (German Research Organisation for Gears and Transmissions. This method can also be adopted for other applications not yet sufficiently defined by STEP. 

  15. Uterine transplantation research: laboratory protocols for clinical application.

    Science.gov (United States)

    Díaz-García, C; Johannesson, L; Enskog, A; Tzakis, A; Olausson, M; Brännström, M

    2012-02-01

    The aim of this review is to summarize the state-of the-art methods that are used in clinical organ transplantation today, as well as the major findings of recent experimental uterus transplantation (UTx) research regarding organ donation/retrieval, ischemic preservation, surgical techniques for anastomosis, immunosuppression and pregnancy. Absolute uterine factor infertility lacks treatment despite the major developments in infertility treatment and assisted reproduction. Concerning uterine factor infertile patients, genetic motherhood is only possible through gestational surrogacy. The latter can pose medical, ethical and legal concerns such as lack of control of life habits during surrogate pregnancy, economic motives for women to become surrogate mothers, medical/psychological pregnancy-related risks of the surrogate mother and uncertainties regarding the mother definition. Thus, surrogacy is non-approved in large parts of the world. Recent advances in the field of solid organ transplantation and experimental UTx provide a favourable and safe background in a scenario in which a human clinical UTx trial can take place. Protocols based on animal research over the last decade are described with a view to providing a scientifically guided approach to human UTx as an experimental procedure in the future. PMID:21900333

  16. Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review

    OpenAIRE

    Luis Filipe; Florentino Fdez-Riverola; Nuno Costa; António Pereira

    2015-01-01

    Wireless Body Area Networks (WBANs) supporting healthcare applications are in early development stage but offer valuable contributions at monitoring, diagnostic, or therapeutic levels. They cover real-time medical information gathering obtained from different sensors with secure data communication and low power consumption. As a consequence of the increasing interest in the application of this type of networks, several articles dealing with different aspects of such systems have been publishe...

  17. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    International Nuclear Information System (INIS)

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA system we achieved the theoretical maximum data throughput limited by UDP both for 1000BASE-T and 1000BASE-KX links. Furthermore, we show that the random jitter of a synchronous clock over a 1000BASE-T link for a PTP application is below 60 ps

  18. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    Science.gov (United States)

    Födisch, P.; Lange, B.; Sandmann, J.; Büchner, A.; Enghardt, W.; Kaever, P.

    2016-01-01

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA system we achieved the theoretical maximum data throughput limited by UDP both for 1000BASE-T and 1000BASE-KX links. Furthermore, we show that the random jitter of a synchronous clock over a 1000BASE-T link for a PTP application is below 60 ps.

  19. Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Qing-hua; QU Yu-gui; LIN Zhi-ting; BAI Rong-gang; ZHAO Bao-hua; PAN Quan-ke

    2007-01-01

    Wireless sensor networks (WSN) using cooperative multiple-input multiple-output (MIMO) communication are effective tools to collect data in several environments. However, how to apply cooperative MIMO in WSN remains a critical challenge, especially in sparse WSN. In this article, a novel clustering scheme is proposed for the application of cooperative MIMO in sparse WSN by extending the traditional low-energy adaptive clustering hierarchy (LEACH) protocol. This clustering scheme solves the problem that the cluster heads (CH) cannot find enough secondary cluster heads (SCH), which are used to cooperate and inform multiple-antenna transmitters with CHs. On the basis of this protocol, the overall energy consumption of the networks model is developed, and the optimal number of CHs is obtained. The simulation results show that this protocol is feasible for the sparse WSN. The simulation results also illustrate that this protocol provides significant energy efficiencies, even after allowing for additional overheads.

  20. Software application for quality control protocol of mammography systems

    International Nuclear Information System (INIS)

    Considering the fact that the Quality Control of the technological process of the mammographic system involves testing of a large number of parameters, it is clearly evident that there is a need for using the information technology for gathering, processing and storing of all the parameters that are result of this process. The main goal of this software application is facilitation and automation of the gathering, processing, storing and presenting process of the data related to the qualification of the physical and technical parameters during the quality control of the technological process of the mammographic system. The software application along with its user interface and database has been made with the Microsoft Access 2003 application which is part of the Microsoft Office 2003 software packet and has been chosen as a platform for developing because it is the most commonly used office application today among the computer users in the country. This is important because it will provide the end users a familiar environment to work in, without the need for additional training and improving the computer skills that they posses. Most importantly, the software application is easy to use, fast in calculating the parameters needed and it is an excellent way to store and display the results. There is a possibility for up scaling this software solution so it can be used by many different users at the same time over the Internet. It is highly recommended that this system is implemented as soon as possible in the quality control process of the mammographic systems due to its many advantages.(Author)

  1. Applications of the RTOP-CA Code for Failed Fuel Diagnosis and Predictions of Activity Level in WWER Primary Circuit

    International Nuclear Information System (INIS)

    An integrated approach to diagnosis of fuel failures at WWERs has been developed during recent years. It includes the following three stages. The first is fuel failure analysis under operating conditions. It provides the on-line assessment of failure characteristics: burnup and number of failed fuel rods as well as defect size. Contamination of the core with tramp uranium is also evaluated. Analysis is performed with the pilot version of the expert system, which has been developed on the basis of the mechanistic code RTOP-CA [1]. The RTOP-CA code is capable to predict the primary coolant activity and degradation of failed fuel properties. The second stage of failure monitoring is so-called 'sipping' tests in the mast of the refueling machine. Equipment for these tests is optional. At present time it is available not for all WWER units. Preliminary on-line evaluations reduce the uncertainty in failure parameters and decrease the risk to 'miss' a leaking fuel assembly in subsequent tests. The sipping technique identifies the failures in course of reactor refueling. However the defectiveness of the identified fuel assemblies as well as its severity have to be confirmed in additional leakage tests (performed in the specialized casks of the spent fuel pool). If the sipping equipment is not installed at an NPP unit then failure diagnosis during reactor operation is the only means to reduce time and optimize financial costs of the leakage tests. The leakage tests are the final stage of failure monitoring. A new technique with pressure cycling in the specialized casks was introduced to meet the requirements of higher reliability in detection/confirmation of the leakages (see Ref. [2]). Measurements of the activity release kinetics during the pressure cycling and handling of the acquired data with the RTOP-LT code enable to evaluate a defect size in leaking fuel assembly. These evaluations are taken into account to make a decision whether the leaking fuel may be reloaded

  2. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    CERN Document Server

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko

    2012-01-01

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  3. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    Institute of Scientific and Technical Information of China (English)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic,furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components.

  4. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    CERN Document Server

    Födisch, P; Sandmann, J; Büchner, A; Enghardt, W; Kaever, P

    2015-01-01

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA ...

  5. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms. PMID:26547846

  6. The role of nuclear imaging in the failing heart: myocardial blood flow, sympathetic innervation, and future applications

    OpenAIRE

    Boogers, Mark J.; Fukushima, Kenji; Bengel, Frank M.; Bax, Jeroen J.

    2010-01-01

    Heart failure represents a common disease affecting approximately 5 million patients in the United States. Several conditions play an important role in the development and progression of heart failure, including abnormalities in myocardial blood flow and sympathetic innervation. Nuclear imaging represents the only imaging modality with sufficient sensitivity to assess myocardial blood flow and sympathetic innervation of the failing heart. Although nuclear imaging with single-photon emission c...

  7. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    Science.gov (United States)

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  8. Mobile Application Use in Monitoring Patient Adherence to Perioperative Total Knee Arthroplasty Protocols.

    Science.gov (United States)

    Kim, Kelvin; Pham, Diep; Schwarzkopf, Ran

    2016-04-01

    The potential for using mobile applications (apps) as an effective tool to monitor patients in an outpatient setting is promising. Past studies have investigated the use of applications in preoperative and postoperative settings as well as in monitoring and treating chronic illnesses such as diabetes, congestive heart failure (CHF), and multiple sclerosis. However, there is limited data on its specific use in the context of total knee arthroplasty. Given the complicated nature and crucial role of patient adherence to protocols during the preparatory and recovery phases of the procedure, the use of an app can serve as a helpful tool in aiding patients throughout this process. We present a pilot study to assess the efficacy of using such an app in order to monitor patient adherence to total knee arthroplasty-specific preoperative and postoperative protocols. Preoperative protocols used in this study included a 5-item medication protocol and multiple activity instructions. Postoperative patient protocols included following instructions on topics such as recording responses to quality-of-life questions, when and how to contact the clinical team if patients had non-emergent concerns or questions, and carrying out daily physical therapy (PT) exercises. Patients received and recorded responses to these preoperative and postoperative instructions using the iGetBetter program application installed on an iPad Mini, provided to the participants. Patient adherence was based on the data gathered from the patient responses inputted on this app. Adherence rates were comparable to those reported in various past studies that also investigated rates of adherence to health management-related instructions communicated through mobile apps. PMID:27042789

  9. An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN

    Science.gov (United States)

    Li, Deliang; Peng, Fei; Qian, Depei

    Energy efficiency has been a main concern in wireless sensor networks where Medium Access Control (MAC) protocol plays an important role. However, current MAC protocols designed for energy saving have seldom considered multiple applications coexisting in WSN with variation of traffic load dynamics and different QoS requirements. In this paper, we propose an adaptive control algorithm at MAC layer to promote energy efficiency. We focus on the tradeoff relation between collisions and control overhead as a reflection of traffic load and propose to balance the tradeoff under the constraints of QoS options. We integrate the algorithm into S-MAC and verify it through NS-2 platform. The results demonstrate the algorithm achieves observable improvement in energy performance while meeting QoS requirement for different coexisting applications in comparison with S-MAC.

  10. Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices

    OpenAIRE

    Wolfgang Braun; Michael Menth

    2014-01-01

    We explain the notion of software-defined networking (SDN), whose southbound interface may be implemented by the OpenFlow protocol. We describe the operation of OpenFlow and summarize the features of specification versions 1.0–1.4. We give an overview of existing SDN-based applications grouped by topic areas. Finally, we point out architectural design choices for SDN using OpenFlow and discuss their performance implications.

  11. Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices

    Directory of Open Access Journals (Sweden)

    Wolfgang Braun

    2014-05-01

    Full Text Available We explain the notion of software-defined networking (SDN, whose southbound interface may be implemented by the OpenFlow protocol. We describe the operation of OpenFlow and summarize the features of specification versions 1.0–1.4. We give an overview of existing SDN-based applications grouped by topic areas. Finally, we point out architectural design choices for SDN using OpenFlow and discuss their performance implications.

  12. A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS

    Institute of Scientific and Technical Information of China (English)

    Chen Ping; Ji Yimu; Wang Ruchuan; Huang Haiping; Zhang Dan

    2013-01-01

    Recently,privacy concerns become an increasingly critical issue.Secure multi-party computation plays an important role in privacy-preserving.Secure multi-party computational geometry is a new field of secure multi-party computation.In this paper,we devote to investigating the solutions to some secure geometric problems in a cooperative environment.The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other.A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods.And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs),based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP),so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.

  13. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr; Perez de Prado, Rocio

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...

  14. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    Science.gov (United States)

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  15. A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nike Gui

    2010-05-01

    Full Text Available Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source nodes. In this paper, we propose a secure routing and aggregation protocol with low energy cost for sensor networks (named STAPLE, which utilizes one-way hash chain and multi-path mechanism to achieve security of wireless sensor networks, and develop a network expanding model to control communication cost incurred by multi-path routing. Then we discuss the protocol application in multi-sink wireless sensor networks. Finally, we perform the simulation of STAPLE in comparison with INSENS, the results demonstrate that STAPLE achieves a higher level security with considerably low communication overhead.

  16. A High Throughput MAC Protocol for Wireless Sensor Networks in Surveillance Applications

    Directory of Open Access Journals (Sweden)

    Jian-hua WANG

    2013-09-01

    Full Text Available Monitoring a given environment is a kind of major applications in wireless sensor networks. These WSNs should often meet special requirements, such as high throughput support, service differentiation support and energy efficiency. However, related works always emphasis on one or two of them, and hardly consider comprehensively. In this paper, we propose a new-style MAC protocol, which based on the above-mentioned factors. Cluster-based multi-hop scheduling and priority-aware schedule switching are crucial technologies in the MAC protocol. Moreover, idle listening energy consumption is reduced by using a synchronized duty cycle. Experiments show that the proposed strategy achieves our goals. The energy consumption of the radio module is reduced while high throughput is provided.

  17. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  18. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  19. Evaluation of network structures and protocols for nuclear-specific applications

    International Nuclear Information System (INIS)

    The evaluation of industrial implementations of network structures associated with nuclear-specific applications is the main focus of this paper. Establishing numerous network structures currently used in nuclear industry, this project analyzes the functionality and reliability of different structures. The communication structures studied in this paper include Fieldbus and Modbus Communication Protocols, Object Linking and Embedding process control (OPC), Dynamic Data Exchange (DDE) and Net-DDE. This paper focuses on identifying the potential problems in applying various network structures to nuclear industry to enable a nuclear-specific network structure to be developed for the fast growing nuclear industry. (author)

  20. “Wireless Sensor Networks - Architectures, Protocols, Simulators and Applications: a Survey”

    Directory of Open Access Journals (Sweden)

    S. G. Shiva Prasad Yadav

    2012-09-01

    Full Text Available Wireless Sensor Networks (WSNs have emerged as a new research technology in the distributed computing environment and plays a very important role in the pervasive computing to support various applications. It has a great potential to be utilized in battlefields and in different commercial applications like traffic surveillance, habitat monitoring, construction structures, smart homes, offices and many more. Research on several aspects of WSNs like energy efficiency, power management, rouunrting, topology control, data management and security are progressing extensively. In this technical paper a survey on recent trends in wireless sensor network research, different topologies, routing protocols, simulators and applications is carried out. A smart WSN consists of sensor nodes made of small electronic device and are deployed across a geographical area. These nodes carry out the sensing, processing and transmission of data from different physical environments. They depend on batteries which get drained very soon due to the computation and data transmission to other nodes. The architectures of WSN are mainly depending on application requirements. WSN is a multidisciplinary area of research where different applications developers, users, hardware and software designers need to work closely to implement an efficient application. The different characteristics of the sensor network like flexibility, fault tolerance, high sensing fidelity, low cost and rapid deployment create many new and exciting application areas.

  1. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  2. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  3. Selling Failed Banks

    OpenAIRE

    Joao Granja; Gregor Matvos; Amit Seru

    2014-01-01

    We study the recent episode of bank failures and provide simple facts to better understand who acquires failed banks and which forces drive the losses that the FDIC realizes from these sales. We document three distinct forces related to the allocation of failed banks to potential acquirers. First, a geographically proximate bank is significantly more likely to acquire a failed bank: only 15% of acquirers do not have branches within the state. Sales are more local in regions with more soft inf...

  4. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  5. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  6. APPLICATION OF NEWTON RAPHSON ALGORITHM FOR OPTIMIZING TRANSMISSION CONTROL PROTOCOL PERFORMANCE

    Directory of Open Access Journals (Sweden)

    J. Viji Priya

    2013-01-01

    Full Text Available Wireless networks are growing rapidly. TCP is the most widely-used protocol on Internet and so optimizing TCP performance is very important for fast efficient data transfer. The different existing TCP variants and solutions they have not been analyzed together to identify the bottlenecks in wireless networks. TCP has a major problem in its congestion control algorithm which does not allow the flow to achieve the full available bandwidth on fast long-distance links. This problem has been studied in this study using a new high speed congestion control TCP protocol based on the Newton Raphson algorithm This study further analyses involving six TCP performance evaluation constraints namely, TCP full bandwidth utilization, throughput, packet loss rate, fairness in sharing bandwidth, friendliness in short-RTT and long-RTT and these constraints are used to evaluate the proposed Newton Raphson Congestion Control (NRC-TCP performance. This study shows that the proposed algorithm performs better compared with the other methods of application.

  7. A new Energy-Efficient TDMA-based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shams Ur Rahman

    2012-07-01

    Full Text Available Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol cannot be optimal for all types of applications. In this paper we present a TDMA-based MAC (TDMAC protocol which is specially designed for such applications that require periodic sensing of the sensor field. TDMAC organizes nodes into clusters. Nodes send their data to their cluster head (CH and CHs forward it to the base station. CHs away from the base station use multi-hop communication by forwarding their data to CHs nearer than themselves to the base station. Both inter-cluster and intra-cluster communication is purely TDMA-based which effectively eliminates both inter-cluster as well as intra-cluster interference.

  8. (abstract) Experimental Results From Internetworking Data Applications Over Various Wireless Networks Using a Single Flexible Error Control Protocol

    Science.gov (United States)

    Kanai, T.; Kramer, M.; McAuley, A. J.; Nowack, S.; Pinck, D. S.; Ramirez, G.; Stewart, I.; Tohme, H.; Tong, L.

    1995-01-01

    This paper describes results from several wireless field trials in New Jersey, California, and Colorado, conducted jointly by researchers at Bellcore, JPL, and US West over the course of 1993 and 1994. During these trials, applications communicated over multiple wireless networks including satellite, low power PCS, high power cellular, packet data, and the wireline Public Switched Telecommunications Network (PSTN). Key goals included 1) designing data applications and an API suited to mobile users, 2) investigating internetworking issues, 3) characterizing wireless networks under various field conditions, and 4) comparing the performance of different protocol mechanisms over the diverse networks and applications. We describe experimental results for different protocol mechanisms and parameters, such as acknowledgment schemes and packet sizes. We show the need for powerful error control mechanisms such as selective acknowledgements and combining data from multiple transmissions. We highlight the possibility of a common protocol for all wireless networks, from micro-cellular PCS to satellite networks.

  9. An Isabelle formalization of protocol-independent secrecy with an application to e-commerce

    OpenAIRE

    Blanqui, Frédéric

    2006-01-01

    A protocol-independent secrecy theorem is established and applied to several non-trivial protocols. In particular, it is applied to protocols proposed for protecting the computation results of free-roaming mobile agents doing comparison shopping. All the results presented here have been formally proved in Isabelle by building on Larry Paulson's inductive approach. This therefore provides a library of general theorems that can be applied to other protocols.

  10. An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

    OpenAIRE

    Ehsan Ahvar; Shohreh Ahvar; Gyu Myoung Lee; Noel Crespi

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, e...

  11. A comparison of image communication protocols in e-science platform for biomedical imaging research and applications

    Science.gov (United States)

    Wang, Tusheng; Yang, Yuanyuan; Hu, Haibo; Zhang, Jianguo

    2012-02-01

    In designing of e-Science platform for biomedical imaging research and application cross multiple academic institutions and hospitals, it needs to find out the best communication protocol to transmit various kinds of biomedical images acquired from Shanghai Synchrotron Radiation Source (SSRS), micro-PET, Micro-CT which includes both types of DICOM and non-DICOM images. In this presentation, we presented several image communication scenarios required in e-Science platform and several possible image communication protocols, and then tested and evaluated the performance of these image communication protocols in e-Science data flows to find out which protocol is the best candidate to be used in e-Science platform for the purpose for security, communication performance, easy implementation and management.

  12. Effects of two different continuous passive motion application protocols on the functional activities of total knee arthroplasty inpatients

    OpenAIRE

    Bakırhan, Serkan; Ünver, Bayram; Karatosun, Vasfi

    2015-01-01

    Objective: The aim of this study was to compare the effects of two different continuous passive motion (CPM) application protocols (low- and high-angle) on the early phase functional activities of total knee arthroplasty inpatients.Methods: The study included 170 patients who underwent primary TKA. While 84 of the TKA patients underwent low-angle CPM application, 86 of the patients underwent high-angle CPM application. The patients’ functional activities were compared using the Iowa Level of ...

  13. Nuclear liability: Joint protocol relating to the application of the Vienna Convention and the Paris Convention, 1988

    International Nuclear Information System (INIS)

    The Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met in Vienna, at the Headquarters of the International Atomic Energy Agency on 21 September 1988. The Joint Protocol establishes a link between the Paris Convention on Third Party Liability in the Field of Nuclear Energy of 1960 and the Vienna Convention on Civil Liability for Nuclear Damage of 1963. The Joint Protocol will extend to the States adhering to it the coverage of the two Conventions. It will also resolve potential conflicts of law, which could result from the simultaneous application of the two Conventions to the same nuclear accident. The Conference on the Relationship between the Paris Convention and the Vienna Convention was jointly organized by the International Atomic Energy Agency and the OECD Nuclear Energy Agency. This publication contains the text of the Final Act of the Conference in the six authentic languages, the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention, also in the six authentic languages and an explanatory note, prepared by the IAEA and NEA Secretariats, providing background information on the content of the Joint Protocol

  14. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  15. CERN and the 10,000th application of the WorldFIP protocol

    CERN Multimedia

    2001-01-01

    On 24 April, CERN received an award for the 10,000th application of the WorldFIP industrial communication network protocol. The award was presented to Juan Antonio Rubio, Head of CERN's ETT Division, by Marc Desjardins, President of the WorldFIP association, which groups together 430 industrial partners with the aim of promoting the WorldFIP concept. Marc Desjardins, President of the WorldFIP association, presenting the award for the 10,000th application to CERN ETT Division Leader Juan Antonio Rubio. From left to right: Guy Baribaud (CERN), Ercole Gallacio (WF), Noël Fayard (WF), Gérard Demars (WF), Dario Fantoni (WF), Marc Desjardins (WF), Raymond Brun (CERN), Jean-Pierre Hauet (WF), Juan Antonio Rubio (CERN), Bernard Jouga (WF), Raymond Rausch (CERN), Jean-Pierre Froidevaux (WF), Marilena Streit-Bianchi (CERN), Michel Rabany (CERN), Patrick Chatelet (WF), Nicolas Cravoisy (WF), Jean Bergeal (WF). Communication networks, also known as fieldbuses, provide for digital comunication betwe...

  16. Failed endotracheal intubation

    Directory of Open Access Journals (Sweden)

    Sheykhol Islami V

    1995-07-01

    Full Text Available The incidence of failed intubation is higher in obstetric than other surgical patients. Failed intubation was the 2nd commonest cause of mortality during anesthesia. Bearing in mind that failre to intubate may be unavoidable in certain circumstances, it is worth reviewing. The factors, which may contribute to a disastrous out come. Priorities of subsequent management must include maintaining oxygenation and preventing aspiration of gastric contents. Fiber optic intubation is now the technique of choice with a high success rate and with least trauma to the patient.

  17. A review on routing protocols for application in wireless sensor networks

    OpenAIRE

    Neha Rathi; Jyoti Saraswat; ParthaPratim Bhattacharya

    2012-01-01

    Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. So it is essential to design effective and energy aware protocol in order to enhance the network lifetime. In this paper, a review on routing protocol in WSNs is carried out which are classified as data-centric, hierarchical and location based depending on the network structure. Then some of the multipath routing protocols which are widely used in WSNs to improve network performance are also discu...

  18. Evaluation and Application of the Strand-Specific Protocol for Next-Generation Sequencing

    Directory of Open Access Journals (Sweden)

    Kuo-Wang Tsai

    2015-01-01

    Full Text Available Next-generation sequencing (NGS has become a powerful sequencing tool, applied in a wide range of biological studies. However, the traditional sample preparation protocol for NGS is non-strand-specific (NSS, leading to biased estimates of expression for transcripts overlapped at the antisense strand. Strand-specific (SS protocols have recently been developed. In this study, we prepared the same RNA sample by using the SS and NSS protocols, followed by sequencing with Illumina HiSeq platform. Using real-time quantitative PCR as a standard, we first proved that the SS protocol more precisely estimates gene expressions compared with the NSS protocol, particularly for those overlapped at the antisense strand. In addition, we also showed that the sequence reads from the SS protocol are comparable with those from conventional NSS protocols in many aspects. Finally, we also mapped a fraction of sequence reads back to the antisense strand of the known genes, originally without annotated genes located. Using sequence assembly and PCR validation, we succeeded in identifying and characterizing the novel antisense genes. Our results show that the SS protocol performs more accurately than the traditional NSS protocol and can be applied in future studies.

  19. Abortion: Strong's counterexamples fail

    DEFF Research Database (Denmark)

    Di Nucci, Ezio

    2009-01-01

    This paper shows that the counterexamples proposed by Strong in 2008 in the Journal of Medical Ethics to Marquis's argument against abortion fail. Strong's basic idea is that there are cases--for example, terminally ill patients--where killing an adult human being is prima facie seriously morally...

  20. Probabilistic risk analysis of aging components which fail on demand. A Bayesian model. Application to maintenance optimization of Diesel engine linings

    International Nuclear Information System (INIS)

    The optimization of preventive maintenance of aging materials can be well modelled through the application of the two-parameters Weibull law. Unfortunately there is no theoretical model describing the aging of components implied in emergency interventions which may fail in very moment of demand. These components are relevant to the safety of Nuclear Power Plants and the main problem with them is the optimization of the maintenance and the test schedule. Indeed the effect of any test is twofold, namely: the test reveals failures which otherwise would occur when the Power Plant would need urgent intervention but at the same time it causes the aging process to step up. The aging process is suspected to affect certain safeguard equipment, but it does not exist a theoretical model of component aging in function of demands. Sections 2.1 and 2.2 of the paper are devoted to the description of a Bayesian model of discrete aging, deriving the likelihood function of the model (data modelling) and to selecting 'the best prior' (Analyst knowledge) that can be associated to the likelihood, respectively. The aspects of numerical integration relative to assessing the predictive reliability of the aging components are discussed in Section 2.3. Section 3 reports a Reliability Centered Maintenance application of the model to cylinders of emergency electrical generators of the NPP nuclear sectors. These components are subjected to an annual endoscopic checking and to a systematical replacement at every 5 years. The statistical Bayesian decision theory was applied to determine an optimal period of cylinder replacement based on the aging model presented in this paper. It is shown that the optimal value is between 10 to 12 years. (author)

  1. Update on the Vienna Protocol and CSC: issues of implementation and application in national legislation

    International Nuclear Information System (INIS)

    This paper aims to reflect the recent developments in respect of the 1997 Vienna Protocol (VP) and the 1997 Convention on Supplementary Compensation (CSC), i.e. the changes in signatories and ratificiations of both instruments, and the impacts these will have upon the geographical scope of nuclear liability laws of those countries covered or linked to each other within the international nuclear liability regime. To the extent that certain countries have ratified either the VP or the CSC, it is important to analyse their existing nuclear liability legislation and the manner in which it already implements or aims to implement certain crucial new elements introduced by both instruments, such as, the liability limitation in time and amount, the extension of the geographical scope to damage wherever suffered as well as in the EEZ, the extension of the definition of nuclear damage and preventive measures, and finally, the deletion of some of the exoneration of the operatos's liability. In this context, especially the concept of nuclear environmental damage and the extent to which it is currently covered by existing nuclear liability legislation or, possibly, environmental law, will be given some special attention. Finally, the paper will focus on various aspects of the implementation and application of these new elements of both 1997 instruments within some CEEC's nuclear liability regimes as an example to identify those issues that will produce special problems (e.g., administrative, legal, insurance, or political) or necessitate additional legislative efforts in respect of their implementation in national laws. (author)

  2. An application protocol for CAD to CAD transfer of electronic information

    Science.gov (United States)

    Azu, Charles C., Jr.

    1993-01-01

    The exchange of Computer Aided Design (CAD) information between dissimilar CAD systems is a problem. This is especially true for transferring electronics CAD information such as multi-chip module (MCM), hybrid microcircuit assembly (HMA), and printed circuit board (PCB) designs. Currently, there exists several neutral data formats for transferring electronics CAD information. These include IGES, EDIF, and DXF formats. All these formats have limitations for use in exchanging electronic data. In an attempt to overcome these limitations, the Navy's MicroCIM program implemented a project to transfer hybrid microcircuit design information between dissimilar CAD systems. The IGES (Initial Graphics Exchange Specification) format is used since it is well established within the CAD industry. The goal of the project is to have a complete transfer of microelectronic CAD information, using IGES, without any data loss. An Application Protocol (AP) is being developed to specify how hybrid microcircuit CAD information will be represented by IGES entity constructs. The AP defines which IGES data items are appropriate for describing HMA geometry, connectivity, and processing as well as HMA material characteristics.

  3. Failed fuel degradation

    International Nuclear Information System (INIS)

    Failed fuel degradation is the term used to describe the post-defect deterioration of a fuel rod which can occur under continued operation in certain circumstances. Two mechanisms are generally postulated for failed fuel degradation in light water reactors. The first of these attributes degradation susceptibility (axial split formation) to the inherently low fracture toughness of the zircaloy cladding exacerbated by hydrogen embrittlement. The second mechanism attributes the degradation to the reduced relative corrosion resistance of the zirconium liner present in barrier fuel. This leads to a greater fuel rod internal inventory of embrittling hydrogen in conjunction with increased cladding stresses caused by closure of the pellet-cladding gap due to liner corrosion. Key observations relating to these mechanisms are reviewed and the development of mitigating actions to address them described. Commercial irradiation experience gained with subsequently improved fuel designs is discussed. (5 figures; 7 references) (UK)

  4. I Failed Again

    Institute of Scientific and Technical Information of China (English)

    杨友连

    2009-01-01

    Yesterday afternoon I participated in an interview for an English debate contest, and failed, completely1. To make the contest fair, everyone is2 supposed to draw a lot to decide his/her topic. The one I got was "Women should be allowed to sell their eggs." The rest got "Whether military training should be compulsary."3 "Whether compulsary education should be extended to 12 years.", and the like. And I was the third to give my speech. Bad luck!

  5. Space-Data Routers: Advanced data routing protocols for enhancing data exploitation for space weather applications

    Science.gov (United States)

    Anastasiadis, Anastasios; Daglis, Ioannis A.; Balasis, George; Papadimitriou, Constantinos; Tsaoussidis, Vassilios; Diamantopoulos, Sotirios

    2014-05-01

    Data sharing and access are major issues in space sciences, as they influence the degree of data exploitation. The availability of multi-spacecraft distributed observation methods and adaptive mission architectures require computationally intensive analysis methods. Moreover, accurate space weather forecasting and future space exploration far from Earth will be in need of real-time data distribution and assimilation technologies. The FP7-Space collaborative research project "Space-Data Routers" (SDR) relies on space internetworking and in particular on Delay Tolerant Networking (DTN), which marks the new era in space communications. SDR unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The main goal is to allow space agencies, academic institutes and research centers to share space-data generated by single or multiple missions, in an efficient, secure and automated manner. Here we are presenting the architecture and basic functionality of a DTN-based application specifically designed in the framework of the SDR project, for data query, retrieval and administration that will enable addressing outstanding science questions related to space weather, through the provision of simultaneous real-time data sampling at multiple points in space. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  6. On the security of a simple three-party key exchange protocol without server's public keys.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  7. Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 11 June 1998. It was signed in Vienna on 12 June 1998

  8. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 12 September 2000. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 12 September 2000. The Joint Protocol entered into force on 27 April 1992

  9. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  10. Protocol Additional to the Agreement between the People's Republic of China and the International Atomic Energy Agency for the Application of Safeguards in China

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of China and the International Atomic Energy Agency for the application of safeguards in China is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 31 December 1998. Pursuant to Article 10 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from China written notification that China's statutory and constitutional requirements for entry into force have been met, i.e. on 28 March 2002

  11. When physical intuition fails

    CERN Document Server

    Singh, Chandralekha

    2016-01-01

    We analyze the problem solving strategies of physics professors in a case where their physical intuition fails. A non-intuitive introductory-level problem was identified and posed to twenty physics professors. The problem placed the professors in a situation often encountered by students, and their response highlights the importance of intuition and experience in problem solving. While professors had difficulty in solving the problem under the time constraint, they initially employed a systematic approach, e.g., visualizing the problem, considering various conservation laws, and examining limiting cases. After finding that familiar techniques were not fruitful, they made incorrect predictions based on one of two equally important factors. By contrast, other more familiar problems that require the consideration of two important principles (e.g., conservation of both energy and momentum for a ballistic pendulum) are quickly solved by the same professors. The responses of students who were given the same problem...

  12. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  13. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  14. On the Performance of the Current MANET Routing Protocols for VoIP, HTTP, and FTP Applications

    Directory of Open Access Journals (Sweden)

    Waheb A. Jabbar

    2014-01-01

    Full Text Available The recent advances of ensemble mobile environment of smart devices with embedded sensors have enabled the MANET to play a key role in the smart cities as well as WSN and WMN. However, these smart devices are still limited in terms of energy, processor, and memory. Moreover, the efficient routing for reliable network connectivity at anytime, anywhere, and about everything is still a challenge in multihop wireless networks. This paper evaluates the QoS and energy efficiency of three active routing protocols: (i OLSRv2, a successor to OLSR, (ii DYMO, a successor to both DSR and AODV, and (iii MP-OLSR multipath extension to OLSRv2. In contrast to the related previous works which focused only on CBR traffic without considering the influence of specific traffic types on the performance of routing protocols, this work focused on this area from a different perspective. It evaluates the performance of three internet-based traffic types that can be used in the smart city applications: VoIP, HTTP, and FTP using different simulation models. The impact of the network density, load traffic, and nodes mobility on the considered protocols was evaluated by considering particular performance metrics for each traffic application. Based on the results, the study concludes by presenting useful recommendations for future work.

  15. Does a meditation protocol supported by a mobile application help people reduce stress? Suggestions from a controlled pragmatic trial.

    Science.gov (United States)

    Carissoli, Claudia; Villani, Daniela; Riva, Giuseppe

    2015-01-01

    The aim of this study was to examine the efficacy of a 3 week mindfulness inspired protocol, delivered by an Android application for smartphones, in reducing stress in the adult population. By using a controlled pragmatic trial, a self-help intervention group of meditators was compared with a typical control group listening to relaxing music and a waiting list group. The final sample included 56 Italian workers as participants, block randomized to the three conditions. The self-reported level of perceived stress was assessed at the beginning and at the end of the protocol. Participants were also instructed to track their heart rate before and after each session. The results did not show any significant differences between groups, but both self-help intervention groups demonstrated an improvement in coping with stress. Nevertheless, meditators and music listeners reported a significant decrease in average heartbeats per minute after each session. Furthermore, both groups perceived a moderate but significant change in stress reduction perceptions, even if with some peculiarities. Limitations and opportunities related to the meditation protocol supported by the mobile application to reduce stress are discussed. PMID:25584730

  16. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    DEFF Research Database (Denmark)

    Mikkelsen, Gert Læssøe; Keller, Marcel; Rupp, Andy

    2012-01-01

    discrete logarithms, representations, p-th roots, etc.), as well as OR statements. These building blocks are proven secure in our model. Furthermore, we apply the developed primitives and techniques in the context of user-centric protocols. In particular, we construct distributed-user variants of Brands’ e...

  17. The application of MODBUS protocol in XFR instrument used to analyze the cement composition

    International Nuclear Information System (INIS)

    This paper briefly introduced the MODBUS protocol at the beginning. Then the data communication between XFR instrument and the main controlling system of cement production is discussed. The diagram of data communication and part of member functions of serial port class are provided, under Visual C++ programming language

  18. Lower bounds on information complexity via zero-communication protocols and applications

    CERN Document Server

    Kerenidis, Iordanis; Lerays, Virginie; Roland, Jeremie; Xiao, David

    2012-01-01

    We show that almost all known lower bound methods for communication complexity are also lower bounds for the information complexity. In particular, we define a relaxed version of the partition bound of Jain and Klauck and prove that it lower bounds the information complexity of any function. Our relaxed partition bound subsumes all norm based methods (e.g. the factorization norm method) and rectangle-based methods (e.g. the rectangle/corruption bound, the smooth rectangle bound, and the discrepancy bound), except the partition bound. Our result uses a new connection between rectangles and zero-communication protocols where the players can either output a value or abort. We prove the following compression lemma: given a protocol for a function f with information complexity I, one can construct a zero-communication protocol that has non-abort probability at least 2^{-O(I)} and that computes f correctly with high probability conditioned on not aborting. Then, we show how such a zero-communication protocol relate...

  19. Industrial output restriction and the Kyoto protocol. An input-output approach with application to Canada

    International Nuclear Information System (INIS)

    The objective of this paper is to assess the economic impacts of reducing greenhouse gas emissions by decreasing industrial output in Canada to a level that will meet the target set out in the Kyoto Protocol. The study uses an ecological-economic Input-Output model combining economic components valued in monetary terms with ecologic components - GHG emissions - expressed in physical terms. Economic and greenhouse gas emissions data for Canada are computed in the same sectoral disaggregation. Three policy scenarios are considered: the first one uses the direct emission coefficients to allocate the reduction in industrial output, while the other two use the direct plus indirect emission coefficients. In the first two scenarios, the reduction in industrial sector output is allocated uniformly across sectors while it is allocated to the 12 largest emitting industries in the last one. The estimated impacts indicate that the results vary with the different allocation methods. The third policy scenario, allocation to the 12 largest emitting sectors, is the most cost effective of the three as the impacts of the Kyoto Protocol reduces Gross Domestic Product by 3.1% compared to 24% and 8.1% in the first two scenarios. Computed economic costs should be considered as upper-bounds because the model assumes immediate adjustment to the Kyoto Protocol and because flexibility mechanisms are not incorporated. The resulting upper-bound impact of the third scenario may seem to contradict those who claim that the Kyoto Protocol would place an unbearable burden on the Canadian economy. (author)

  20. DEVELOPMENT AND APPLICATION OF PROTOCOLS FOR EVALUATION OF OIL SPILL BIOREMEDIATION (RESEARCH BRIEF)

    Science.gov (United States)

    Protocols were developed and evaluated to assess the efficacy and environmental safety of commercial oil spill bioremediation agents (CBAs). Test systems that simulate oil slicks on open water or oiled sandy beaches were used to test the effectiveness of CBAs. Gravimetric and gas...

  1. Why foreign aid fails

    Directory of Open Access Journals (Sweden)

    Prokopijević Miroslav

    2007-01-01

    Full Text Available The main point of this paper is that foreign aid fails because the structure of its incentives resembles that of central planning. Aid is not only ineffective, it is arguably counterproductive. Contrary to business firms that are paid by those they are supposed to serve (customers, aid agencies are paid by tax payers of developed countries and not by those they serve. This inverse structure of incentives breaks the stream of pressure that exists on the commercial market. It also creates larger loopholes in the principle-agent relationship on each point along the chain of aid delivery. Both factors enhance corruption, moral hazard and negative selection. Instead of promoting development, aid extends the life of bad institutions and those in power. Proposals to reform foreign aid – like aid privatization and aid conditionality – do not change the existing structure of the incentives in aid delivery, and their implementation may just slightly improve aid efficacy. Larger improvement is not possible. For that reason, foreign aid will continue to be a waste of resources, probably serving some objectives different to those that are usually mentioned, like recipient’s development poverty reduction and pain relief.

  2. Communications protocols for a fault tolerant, integrated local area network for Space Station applications

    Science.gov (United States)

    Meredith, B. D.

    1984-01-01

    The evolutionary growth of the Space Station and the diverse activities onboard are expected to require a hierarchy of integrated,local area networks capable of supporting data, voice and video communications. In addition, fault tolerant network operation is necessary to protect communications between critical systems attached to the net and to relieve the valuable human resources onboard Space Station of day-to-day data system repair tasks. An experimental, local area network is being developed which will serve as a testbed for investigating candidate algorithms and technologies for a fault tolerant, integrated network. The establishment of a set of rules or protocols which govern communications on the net is essential to obtain orderly and reliable operation. A hierarchy of protocols for the experimental network is presented and procedures for data and control communications are described.

  3. A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    A.Damodaram

    2012-10-01

    Full Text Available With the economy developing and popular Internet, the general concept of contract signing has changed.In the past, people usually sign a contract at the same time and same place face to face, but actually eachparty involved in contract may live in different part of earth, they want to sign something for business orsome other things in economic, efficient, secure and fairway. A fair contract signing protocol allows twopotentially mis-trusted parities to exchange their commitments (i.e., digital signatures to an agreedcontract over the Internet in a fair way, so that either each of them obtains the other’s signature, orneither party does. Based on the LUCAS signature scheme, a new digital anonymous contract signingprotocol is proposed in this paper. Like the existing LUCAS-based solutions for the same problem, ourprotocol is fair, anonymous and optimistic. Furthermore, the proposed protocol satisfied a newproperty, i.e., it is abuse-free. That is, if the protocol is executed unsuccessfully, either of the two partiescan not show the validity of intermediate results to others.

  4. Large-scale hydrological simulations using the soil water assessment tool, protocol development, and application in the danube basin.

    Science.gov (United States)

    Pagliero, Liliana; Bouraoui, Fayçal; Willems, Patrick; Diels, Jan

    2014-01-01

    The Water Framework Directive of the European Union requires member states to achieve good ecological status of all water bodies. A harmonized pan-European assessment of water resources availability and quality, as affected by various management options, is necessary for a successful implementation of European environmental legislation. In this context, we developed a methodology to predict surface water flow at the pan-European scale using available datasets. Among the hydrological models available, the Soil Water Assessment Tool was selected because its characteristics make it suitable for large-scale applications with limited data requirements. This paper presents the results for the Danube pilot basin. The Danube Basin is one of the largest European watersheds, covering approximately 803,000 km and portions of 14 countries. The modeling data used included land use and management information, a detailed soil parameters map, and high-resolution climate data. The Danube Basin was divided into 4663 subwatersheds of an average size of 179 km. A modeling protocol is proposed to cope with the problems of hydrological regionalization from gauged to ungauged watersheds and overparameterization and identifiability, which are usually present during calibration. The protocol involves a cluster analysis for the determination of hydrological regions and multiobjective calibration using a combination of manual and automated calibration. The proposed protocol was successfully implemented, with the modeled discharges capturing well the overall hydrological behavior of the basin. PMID:25602548

  5. The 1988 Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention. Explanatory Text

    International Nuclear Information System (INIS)

    At the International Conference on the Safety of Transport of Radioactive Material, held in Vienna in July 2003, it was noted that there are a number of liability conventions to which many States are Parties but to which many others are not, and that the provisions of the liability conventions and the relationships between them are not simple to understand. It was suggested, therefore, that an explanatory text for these instruments be prepared to assist in developing a common understanding of the complex legal issues involved and thereby to promote adherence to these instruments. In view of this suggestion, and in order to foster an effective, global nuclear liability regime, the International Expert Group on Nuclear Liability (INLEX) was established in September 2003. Since its establishment, INLEX has held several meetings, as a result of which it, inter alia, finalized explanatory texts on the nuclear liability instruments adopted under IAEA auspices in 1997, namely, the Protocol to Amend the Vienna Convention on Civil Liability for Nuclear Damage and the Convention on Supplementary Compensation for Nuclear Damage. These explanatory texts have since been published as IAEA International Law Series No. 3. Thereafter, INLEX also developed and finalized the present explanatory text on the 1988 Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention. This publication complements IAEA International Law Series No. 3 and comprises the explanatory text on the Joint Protocol and the text of the Joint Protocol as adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met at IAEA Headquarters in Vienna in September 1988 under the joint auspices of the IAEA and the OECD Nuclear Energy Agency. It is hoped that this publication will further increase the awareness of nuclear liability as an important aspect of nuclear law.

  6. Cryptanalysis on Cheng et al. protocol

    Science.gov (United States)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  7. Developing experimental protocols for chronic irradiation studies: the application of a good practice guide framework

    International Nuclear Information System (INIS)

    The EC-funded FASSET (Framework for Assessment of Environmental Impact) project collated information on the transfer, dosimetry, and effects of ionising radiation on wildlife. A major output from the project is the FASSET Radiation Effects Database (FRED). A review of the information contained within FRED highlighted that information on the effects of low-dose, chronic exposure was, at best, fragmentary. However, these data are required to define the dose effect relationships needed to underpin the assessment tools that are being developed. To address this requirement, a series of four Good Practice Guides (GPGs) has been produced as part of a protocol development framework. This framework aims to harmonise experimental approaches, with a view to ensuring that all necessary data on appropriate endpoints are collected, so that dose effect relationships can be determined. The GPGs cover test species selection, endpoint selection, radiation exposure and experimental design considerations. A key is used to guide researchers through the GPGs and the decisions made are recorded on an output pro-forma. The completed pro-forma forms the basis of the experimental protocol. The pro-forma also indicates the information that should be included when presenting the results of the experiment. Standardising approaches ensures that results are comparable between experiments and that they are suitable for determining dose effect relationships. This protocol development framework has been adopted by the UK Environment Agency as a document upon which future Agency-funded experimental work on the effects of chronic, low-level exposure to ionising radiation will be based. It is hoped that the framework will gain acceptance in the wider scientific community and facilitate addressing the knowledge gaps that have been identified in order that successful protection of non-human biota can be demonstrated. (author)

  8. A Survey on Application Layer Protocols for the Internet of Things

    OpenAIRE

    Karagiannis, Vasileios; Chatzimisios, Periklis; Vázquez-Gallego, Francisco; Alonso-Zárate, Jesús

    2015-01-01

    It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The framework that current IoT platforms use consists mostly in technol...

  9. HTML5 WebSocket protocol and its application to distributed computing

    OpenAIRE

    Muller, Gabriel L.

    2014-01-01

    HTML5 WebSocket protocol brings real time communication in web browsers to a new level. Daily, new products are designed to stay permanently connected to the web. WebSocket is the technology enabling this revolution. WebSockets are supported by all current browsers, but it is still a new technology in constant evolution. WebSockets are slowly replacing older client-server communication technologies. As opposed to comet-like technologies WebSockets' remarkable performances is a result of the p...

  10. Exploitation of existing Voice over Internet Protocol Technology for the Navy application

    OpenAIRE

    Vegter, Henry M.; Wallace, David T.

    2002-01-01

    This thesis documents an investigation into the technology of Voice over Internet Protocol (VoIP). VoIP promises to be a widely accepted technology in the future. The issues of efficient use of bandwidth over network choke points, cost savings gained from a common data and voice infrastructure, reduced cost associated with toll calls and the merger of the telephone with the desktop will keep adoption of this technology on the path to ubiquitous use. Topics explored in the thesis include conve...

  11. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  12. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    International Nuclear Information System (INIS)

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ∼15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ∼45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  13. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-10-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  14. Wireless communication networks and process control applications: Studying the influence of MAC protocols

    OpenAIRE

    Nguyen, Xuan Hung; Juanole, Guy; Mouney, Gérard; Calmettes, Christophe

    2010-01-01

    The performances of the process control applications, which are implemented through networks, depend greatly on the scheduling of the messages. Furthermore, in the context of the wireless networks, because of the unreliable medium, it is difficult to meet the timing requirements imposed by the applications dynamics. The objective of this paper is, by considering a Wireless Local Area Network (WLAN) and a process control application, to compare the performances of this application by using MAC...

  15. Security of RFID protocols

    OpenAIRE

    van Deursen, Ton

    2011-01-01

    Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power source make RFID tags useful in many applications, but also impose a strong need for secure RFID protocols. The first part of this thesis considers the analysis of untraceability of RFID protocols. We start by designing a formal syntax and semantics for security protocols. We define untraceab...

  16. To fail or not to fail : clinical trials in depression

    NARCIS (Netherlands)

    Santen, Gijs Willem Eduard

    2008-01-01

    To fail or not to fail – Clinical trials in depression investigates the causes of the high failure rate of clinical trials in depression research. Apart from the difficulties in the search for new antidepressants during drug discovery, faulty clinical trial designs hinder their evaluation during dru

  17. Applicability of analytical protocols for the characterisation of carbon-supported platinum group metal fuel cell electrocatalysts

    Directory of Open Access Journals (Sweden)

    V. Linkov

    2010-01-01

    Full Text Available The nanoparticulate size of fuel cell electrocatalysts raises significant challenges in the analytical techniques used in their structural and electrochemical characterisation. For this reason, the applicability of analytical protocols in the qualitative and quantitative characterisation of nanophase fuel cell electrocatalysts was investigated. A set of structural and chemical properties influencing the performance of the electrocatalysts was identified. A large range of analytical tools was employed in characterising the electrocatalysts of interest. High accuracy and precision in the quantitative and qualitative structural and electrochemical characterisation of Pt/C and Pt-Ru/C nanophase electrocatalysts was demonstrated. Certain techniques were deemed to be highly applicable in discriminating between high- and low-performance electrocatalysts based on their structural and electrochemical properties. The goal of this effort is to contribute to the development of South Africa’s capabilities in the emerging hydrogen economy.

  18. ALERT协议在水情测报系统中的应用分析%Application And Development of ALERT Protocol in Hydrological Forecasting System

    Institute of Scientific and Technical Information of China (English)

    薛升宁; 胡鸣东; 祁永涛; 朱思良

    2011-01-01

    The characteristics and related industry application of ALERT protocol are introduced. The limitations of ALERT protocol and the update state of ALERT-2 protocol are discussed, the improved ALERT-2 is proposed, and the application prospect of the protocol is put forward.%简单介绍了ALERT协议的特点及其相关行业应用情况,详细分析了ALERT协议的局限性以及改进型ALERT-2协议的最新发展情况,给出了ALERT-2针对ALERT协议的局限性所做出的一些改进,并分析了ALERT协议在水情自动浈6报系统中的应用前景。

  19. Development of a quality assurance protocol for peripheral subtraction imaging applications

    International Nuclear Information System (INIS)

    Peripheral subtraction scanning is used to trace the blood vessels of upper and lower extremities. In some modern C-arm fluoroscopy systems this function is performed automatically. In this mode the system is programmed to advance and stop in a series of steps taking a mask image at each point. The system then repeats each step after the contrast agent has been injected, and produces a DSA image at each point. Current radiographic quality assurance protocols do not address this feature. This note reviews methods of measuring system vibration while images are being acquired in automated peripheral stepping. The effect on image quality pre- and post-image processing is assessed. Results show that peripheral stepping DSA does not provide the same degree of image quality as static DSA. In examining static test objects, the major cause of the reduction in image quality is misregistration due to vibration of the image intensifier during imaging. (author)

  20. Application of the IAP cardiovascular fitness test protocol for Austromars candidate screening

    Science.gov (United States)

    Grasser, E. K.; Goswami, N.; Jantscher, A.; Roessler, A.; Vrecko, K.; Groemer, G.; Hinghofer-Szalkay, H.

    2007-10-01

    Rationale: The purpose of our research was to test for cardiovascular stability within 16 Austromars candidates, and to determine hemodynamic variables and hormones in a presyncopal state as evoked by a specific test protocol. Procedures and methods: We used a graded orthostatic stress (GOS) paradigm consisting of head-up tilt (HUT) combined with lower body negative pressure (LBNP) up to a presyncopal end-point on 15 males and one healthy female. Hemodynamic parameters were monitored and venous blood samples taken. Results: From supine control to presyncope, mean standing time was 12.3 ± 1.2 min, heart rate (HR) increased by 68 ± 12% (p responses under severe stress conditions.

  1. Thoracic dual energy CT: Acquisition protocols, current applications and future developments

    International Nuclear Information System (INIS)

    Thanks to a simultaneous acquisition at high and low kilo-voltage, dual energy computed tomography (DECT) can achieve material-based decomposition (iodine, water, calcium, etc.) and reconstruct images at different energy levels (40 to 140 keV). Post-processing uses this potential to maximise iodine detection, which elicits demonstrated added value for chest imaging in acute and chronic embolic diseases (increases the quality of the examination and identifies perfusion defects), follow-up of aortic endo-grafts and detection of contrast uptake in oncology. In CT angiography, these unique features are taken advantage of to reduce the iodine load by more than half. This review article aims to set out the physical basis for the technology, the acquisition and post-processing protocols used, its proven advantages in chest pathologies, and to present future developments. (authors)

  2. Modeling Acidification Recovery on Threatened Ecosystems: Application to the Evaluation of the Gothenburg Protocol in France

    Energy Technology Data Exchange (ETDEWEB)

    Moncoulon, David [CNRS-IRD-Universite Paul Sabatier, Laboratoire des Mecanismes de Transfert en Geologie, UMR 5563 (France); Probst, Anne [CNRS-INPT-Universite Paul Sabatier, ECOLAB UMR 5245 (France)], E-mail: anne.probst@ensat.fr; Martinson, Liisa [Lund University Centre for Sustainability Studies (Sweden)

    2007-03-15

    To evaluate the acid deposition reduction negotiated for 2010 within the UNECE LRTAP Gothenburg Protocol, sulphur and nitrogen deposition time-series (1880-2100) were compared to critical loads of acidity on five French ecosystems: Massif Central basalt (site 1) and granite (2); Paris Bassin tertiary sands (3); Vosges mountains sandstone (4) and Landes eolian sands (5). The SAFE model was used to estimate the response of soil solution pH and [Al]/[BC] ratio to the deposition scenario. Among the five sites, critical loads were exceeded in the past at sites 3, 4 and 5. Sites 3 and 4 were still expected to exceed in 2010, the Protocol year. Further reduction of atmospheric deposition, mainly nitrogen, would be needed to achieve recovery on these ecosystems. At sites 3, 4 and 5, the delay between the critical load exceedance and the violation of the critical chemical criterion was estimated to be 10 to 30 years in the top soil and 50 to 90 years in the deeper soil. At site 5, a recovery was expected in the top soil in 2010 with a time lag of 10 years. Unexpectedly, soil pH continued to decrease after 1980 in the deeper soil at sites 2 and 5. This time lag indicated that acidification moved down the soil profile as a consequence of slow base cation depletion by ion exchange. This delayed response of the soil solution was the result of the combination of weathering rates and vegetation uptake but also of the relative ratio between base cation deposition and acid compounds.

  3. Informatics in radiology: CT contrast protocols application for the iPad: new resource for technologists, nurses, and radiologists.

    Science.gov (United States)

    Raman, Siva P; Raminpour, Sara; Horton, Karen M; Fishman, Elliot K

    2013-05-01

    The iPad, iPhone, and other portable devices offer a unique opportunity for radiology education, allowing presentation of information in a simple, concise, and mobile fashion to large groups of learners. The CT Contrast Protocols application for the iPad and iPhone is one of the first radiology applications in the Apple App Store to focus on radiology education and was designed to address the lack of practical information on contrast media for radiologists, technologists, nurses, and trainees. The application was developed in response to questions about contrast media use from clinicians, technologists, and nurses; its content is based on questions from these members of the authors' department and hospital, as well as users of the CTisus.com Web site. The application uses a simple interface that requires no training and can be easily navigated by those who have only recently begun using an iPad or iPhone. It provides simple, easily understood answers to many common questions about contrast media use, all arranged under several subject headings. The application is constantly evolving and represents an aggregate of the knowledge found in the literature, the American College of Radiology's consensus guidelines, and the institutional practices of the computed tomography division of Johns Hopkins Hospital. Supplemental material available at http://radiographics.rsna.org/lookup/suppl/doi:10.1148/rg.333125106/-/DC1. PMID:23479681

  4. Sealed source and device design safety testing. Technical report on the findings of task 4. Investigation of a failed brachtherapy needle applicator

    International Nuclear Information System (INIS)

    As a result of an incident in which a radioactive brachytherapy treatment source was temporarily unable to be retracted, an analysis was performed on the needle applicator used during the treatment. In this report, the results of laboratory evaluations of the physical, mechanical, and metallurgical condition of the subject applicator and two additional applicators are presented. A kink formed in the subject applicator during the incident. The laboratory investigation focused on identifying characteristics which would increase the susceptibility of an applicator to form a kink when subjected to bending loads. The results obtained during this investigation could not conclusively identify the cause of the kink. The subject applicator exhibited no unique features which would have made it particularly susceptible to forming a kink. The three applicators examined represent two methods of manufacturing. A number of characteristics inherent to the method used to manufacture the subject applicator which could lead to an increased susceptibility to the formation of a kink were observed. The use of an insertion device, such as the biopsy needle used during this incident, could also dramatically increase the likelihood of the formation of a kink if the applicator is subjected to bending loads. 33 figs., 4 tabs

  5. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  6. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  7. Simple and Efficient Contract Signing Protocol

    OpenAIRE

    Alaraj, Abdullah M.

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP...

  8. Vérification des protocoles cryptographiques : Comparaison des modèles symboliques avec une application des résultats --- Etude des protocoles récursifs

    OpenAIRE

    Hördegen, Heinrich

    2007-01-01

    Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation symbolique de protocoles avec pour objectif la preuve de propriétés de sécurité. La thèse comprend deux parties: La première partie définit quatre modèles symboliques différant par les moyens syntaxiques que les concepteur peuvent utiliser pour représenter les primitives cryptographiques. On a observé que les vérificateurs utilisent des astuces de codage dans des modèles peu riches pour représ...

  9. ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    G.Padmavathi

    2012-02-01

    Full Text Available A mobile ad hoc network (MANETs is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports, dynamic network topologies, open communication channels, and limited device capabilities and bandwidths, have made secure, reliable and efficient routing operations in MANET a challenging task. The ultimate goal of the security solutions for MANET is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability to mobile users. To achieve the goals, the security solution need for entire protocol stack. . The proposed protocol ANODRECC with Telnet provide application layer security and it ensures route anonymity and location privacy and is robust against eavesdropping attack.For route anonymity, it prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, it ensures that adversaries cannot discover the real identities of local transmitters. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has exposed improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio and Average jitter.

  10. Evaluation of two protocols for low-level laser application in patients submitted to orthodontic treatment

    Directory of Open Access Journals (Sweden)

    Mariana Marquezan

    2013-02-01

    Full Text Available INTRODUCTION: Different low-level laser (LLL irradiation protocols have been tested to accelerate orthodontic tooth movement (OTM. Nevertheless, divergent results have been obtained. It was suggested that the stimulatory action of low level laser irradiation occurs during the proliferation and differentiation stages of bone cellular precursors, but not during later stages. OBJECTIVE: The purpose of this study was to determine the effect of two protocols of LLL irradiation on experimental tooth movement: One with daily irradiations and another with irradiations during the early stages. METHODS: Thirty-six rats were divided into control groups (CG1, CG2, CG3 and irradiated groups (IrG1, IrG2, IrG3 according to the presence of: experimental tooth movement, laser irradiation, type of laser irradiation protocol and date of euthanasia (3th or 8th day of experiment. At the end of experimental periods, a quantitative evaluation of the amount of OTM was made and the reactions of the periodontium were analyzed by describing cellular and tissue reactions and by counting blood vessels. RESULTS: The amount of OTM revealed no significant differences between groups in the same experimental period (p INTRODUÇÃO: diferentes protocolos de irradiação por laser de baixa potência (LBP têm sido testados para potencializar o movimento ortodôntico; entretanto, há resultados divergentes. Foi sugerido que seu efeito bioestimulador ocorre nas fases de proliferação e diferenciação celular, não agindo em estágios tardios. OBJETIVO: avaliar o efeito de dois protocolos de irradiação do LBP na movimentação ortodôntica: um com irradiações diárias e outro em que irradiações foram realizadas apenas nos períodos iniciais. MÉTODOS: trinta e seis ratos Wistar foram divididos em grupos controles (GC1, GC2 e GC3 e irradiados (GIr1, GIr2 e GIr3, de acordo com a presença de dispositivo ortodôntico, a presença de irradiação, o tipo de protocolo de irradia

  11. Screening protocol for iodine-specific getters in YMP-related invert applications

    International Nuclear Information System (INIS)

    This document defines a standardized screening protocol for use in developing iodine ''getters'' for placement in the proposed YMP-repository invert. The work was funded by the US Department of Energy (DOE), Office of Civilian Radioactive Waste Management (OCRWM), Office of Science and Technology International (S and T) during 2004-2005. First, the likely environmental conditions in the invert are reviewed as a basis for defining the thermal and geochemical regimes in which a getter must function. These considerations, then, served as the basis for laying out a hierarchy of materials screening tests (Table 1). An experimental design for carrying out these screening tests follows next. Finally, the latter half of the document develops methods for preparing test solutions with chemistries that relate to various aspects of the YMP-repository environment (or, at least to such representations as were available from program documents late in 2004). Throughout the document priority was given to defining procedures that would quickly screen out unpromising candidate materials with a minimum amount of labor. Hence, the proposed protocol relies on batch tests over relatively short times, and on a hierarchy of short pre-test conditioning steps. So as not to repeat the mistakes (and frustrations) encountered in the past (notably in preparing WIPP test brines) particular care was also given to developing standardized test solution recipes that could be prepared easily and reproducibly. This document is principally intended for use as a decision-making tool in evaluating and planning research activities. It is explicitly NOT a roadmap for qualifying getters for actual placement in the repository. That would require a comprehensive test plan and a substantial consensus building effort. This document is also not intended to provide a complete list of all the tests that individuals may wish to carry out. Various materials will have their own peculiar concerns that will call for

  12. Screening Protocol for Iodine-Specific Getters in YMP-Related Invert Applications

    International Nuclear Information System (INIS)

    This document defines a standardized screening protocol for use in developing iodine ''getters'' for placement in the proposed YMP-repository invert. The work was funded by the US Department of Energy (DOE), Office of Civilian Radioactive Waste Management (OCRWM), Office of Science and Technology International (S and T) during 2004-2005. First, the likely environmental conditions in the invert are reviewed as a basis for defining the thermal and geochemical regimes in which a getter must function. These considerations, then, served as the basis for laying out a hierarchy of materials screening tests (Table 1). An experimental design for carrying out these screening tests follows next. Finally, the latter half of the document develops methods for preparing test solutions with chemistries that relate to various aspects of the YMP-repository environment (or, at least to such representations as were available from program documents late in 2004). Throughout the document priority was given to defining procedures that would quickly screen out unpromising candidate materials with a minimum amount of labor. Hence, the proposed protocol relies on batch tests over relatively short times, and on a hierarchy of short pre-test conditioning steps. So as not to repeat the mistakes (and frustrations) encountered in the past (notably in preparing WIPP test brines) particular care was also given to developing standardized test solution recipes that could be prepared easily and reproducibly. This document is principally intended for use as a decision-making tool in evaluating and planning research activities. It is explicitly NOT a roadmap for qualifying getters for actual placement in the repository. That would require a comprehensive test plan and a substantial consensus building effort. This document is also not intended to provide a complete list of all the tests that individuals may wish to carry out. Various materials will have their own peculiar concerns that will call for

  13. An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    CERN Document Server

    Al-Omari, Saleh Ali K; 10.5121/jgraphhoc.2010.2107

    2010-01-01

    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any...

  14. To fail or not to fail: clinical trials in depression

    OpenAIRE

    Santen, Gijs Willem Eduard

    2008-01-01

    To fail or not to fail – Clinical trials in depression investigates the causes of the high failure rate of clinical trials in depression research. Apart from the difficulties in the search for new antidepressants during drug discovery, faulty clinical trial designs hinder their evaluation during drug development. This thesis focuses on three important aspects of clinical trials in depression: clinical endpoints, data analysis and trial design-related factors.

  15. Development of a Multi-Agent m-Health Application Based on Various Protocols for Chronic Disease Self-Management.

    Science.gov (United States)

    Park, Hyun Sang; Cho, Hune; Kim, Hwa Sun

    2016-01-01

    The purpose of this study was to develop and evaluate a mobile health application (Self-Management mobile Personal Health Record: "SmPHR") to ensure the interoperability of various personal health devices (PHDs) and electronic medical record systems (EMRs) for continuous self-management of chronic disease patients. The SmPHR was developed for Android 4.0.3, and implemented according to the optimized standard protocol for each interface of healthcare services adopted by the Continua Health Alliance (CHA). That is, the Personal Area Network (PAN) interface between the application and PHD implements ISO/IEEE 11073-20,601, 10,404, 10,407, 10,415, 10,417, and Bluetooth Health Device Profile (HDP), and EMRs with a wide area network (WAN) interface implement HL7 V2.6; the Health Record Network (HRN) interface implements Continuity of Care Document (CCD) and Continuity of Care Record (CCR). Also, for SmPHR, we evaluated the transmission error rate between the interface using four PHDs and personal health record systems (PHRs) from previous research, with 611 users and elderly people after receiving institutional review board (IRB) approval. In the evaluation, the PAN interface showed 15 (2.4 %) errors, and the WAN and HRN interface showed 13 (2.1 %) errors in a total of 611 transmission attempts. Also, we received opinions regarding SmPHR from 15 healthcare professionals who took part in the clinical trial. Thus, SmPHR can be provided as an interconnected PHR mobile health service to patients, allowing 'plug and play' of PHDs and EMRs through various standard protocols. PMID:26573657

  16. Wikis and collaborative writing applications in healthcare: a scoping review protocol.

    NARCIS (Netherlands)

    Archambault, P.M.; Belt, T.H. van de; Grajales III, F.J.; Eysenbach, G.; Aubin, K.; Gold, I.; Gagnon, M.P.; Kuziemsky, C.E.; Turgeon, A.F.; Poitras, J.; Faber, M.J.; Kremer, J.A.M.; Heldoorn, M.; Bilodeau, A.; Legare, F.

    2012-01-01

    ABSTRACT The rapid rise in the use of collaborative writing applications (eg, wikis, Google Documents, and Google Knol) has created the need for a systematic synthesis of the evidence of their impact as knowledge translation (KT) tools in the health care sector and for an inventory of the factors th

  17. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  18. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    OpenAIRE

    Födisch, P.; Lange, B.; Sandmann, J; Büchner, A; Enghardt, W.; Kaever, P.

    2015-01-01

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad r...

  19. Application Platforms for the Internet of Things: Theory, Architecture, Protocols, Data Formats, and Privacy

    OpenAIRE

    Collina, Matteo

    2014-01-01

    The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using p...

  20. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    OpenAIRE

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor n...

  1. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    OpenAIRE

    Loureiro, Antonio A. F.; José Neuman de Souza; Augusto Neto; Eduardo Cerqueira; Kássio Machado; Denis Rosário

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor ...

  2. 基于Canopen协议的VACON变频器的应用%Application of VACON's Frequency Converter Based on Canopen Protocol

    Institute of Scientific and Technical Information of China (English)

    张泽宇; 刘洋; 陈卓; 蒋炜

    2015-01-01

    This article describes the application of the VACON's frequency converter based on CANOPEN protocol. It uses the CAN fieldbus protocol which is widely used in the field of marine electric propulsion. CANOPEN protocol is used in application layer to monitor and control the VACON's frequency converter, which has merits of low cost, convenience and practicality in ship's electric propulsion system.%本文介绍了基于 CANOPEN 协议的 VACON 变频器的应用.采用在船舶电力推进领域应用广泛的现场总线CAN协议,应用层采用CANOPEN协议对VACON变频器进行监测与控制,在船舶电力推进系统中具有成本低廉、开发方便及实用等优点.

  3. 7 CFR 718.103 - Prevented planted and failed acreage.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Prevented planted and failed acreage. 718.103 Section... APPLICABLE TO MULTIPLE PROGRAMS Determination of Acreage and Compliance § 718.103 Prevented planted and failed acreage. (a) Prevented planting is the inability to plant an eligible crop with proper...

  4. An automatic protocol composition checker

    OpenAIRE

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  5. Perfusion computed tomography in colorectal cancer: Protocols, clinical applications and emerging trends

    Institute of Scientific and Technical Information of China (English)

    Guang-Yao Wu; Prasanna Ghimire

    2009-01-01

    Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC). By providing the functional tumor microvasculature, it also helps the assessment of therapeutic response of anti-angiogenic drugs as it may reflect tumor angiogenesis. Perfusion CT has been applied in clinical practice to delineate inflammatory or neoplastic lymph nodes irrespective of their size,identify micro-metastases and to predict metastases in advance of their development. It is of increasing significance for preoperative adjuvant therapies and avoidance of unnecessary interventions. Despite controversies regarding the techniques employed, its validity and reproducibility, it can be advantageous in the management of CRCs in which the prognosis is dependent on preoperative staging. With recent advances in the perfusion CT techniques, and incorporation to other modalities like positron emission tomography, perfusion CT will be a novel tool in the overall management of CRCs. This article aims at reviewing the existing clinical applications and recent advances of perfusion CT with a reference to future development in the management of CRCs.

  6. A bridge between two Conventions on civil liability for nuclear damage: the Joint protocol Relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    The adoption of the Joint-Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and NEA, was hailed as a landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. This article describes the history of the Joint Protocol during the many years it took to develop this link between the two Conventions, provides a comment on its objectives and content, and discusses some important questions related to its application. (NEA)

  7. Simple and Efficient Contract Signing Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

  8. Tractor succeeds where submarine fails

    International Nuclear Information System (INIS)

    When reactor 4 at Canada's Bruce A nuclear power station was shut down because of a coolant blockage in one of the fuel channels, a special ''submarine'' was developed but failed to remove the obstruction. So a tractor was tried instead and proved to be more successful. The problem and eventual solution is discussed. (U.K.)

  9. The Text of a Protocol between the Agency and the Governments of Thailand and the United States of America Terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and Terminating the Protocol Suspending that Agreement

    International Nuclear Information System (INIS)

    The text of a protocol between the Agency and the Governments of Thailand and the United States of America terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and terminating the Protocol suspending that Agreement is reproduced in this document for the information of all Members. The Protocol entered into force on 27 June 1974, pursuant to Section 6 thereof.

  10. 乐观并发协议在移动计算环境中的应用%Application of Optimistic Concurrency Protocol in Mobile Computing Environment

    Institute of Scientific and Technical Information of China (English)

    帖军; 张宝哲; 王小荣

    2011-01-01

    在移动计算环境中,基本乐观并发协议的事务处理存在并发度低和重启率高等问题.为此,提出一种适用于移动计算环境的乐观事务并发协议一一基于数据读写时间戳的乐观并发控制协议.仿真实验表明,该协议可以提高事务处理的并发度,降低事务重启概率,与基本乐观事务并发控制协议和基于时间戳的乐观事务并发控制协议相比,该协议更适用于移动计算环境.%In mobile computing environment, low concurrency and too many unnecessary transaction restarting exist in original Optimistic Concurrency Control Protocol(OCCP). To solve these problems, a new optimistic transaction concurrency protocol, BOCC-RW, which is based on read and write timestamp, is proposed in mobile computing environment. Simulation experiment shows that the protocol can improve the concurrency of transaction and reduce the probability of transaction restarting. Experiment results show that compared with the original optimistic protocol and optimistic protocol based on timestamp, the BOCC-RW is more applicable in mobile computing environment.

  11. Why cogeneration development projects fail

    International Nuclear Information System (INIS)

    In this paper cogeneration projects that are organized by developers fail to reach fruition for reasons other than the basic economical or technical soundness of the opportunity. Cogeneration development projects fail because of misunderstanding by the host or other participants of their obligations, inadequate management support by the host organization, regulatory changes, environmental difficulties, overly high expectations of profit, changes in fuel economics, utility policy changes, changing financial markets, and a variety of other issues. Each of these potential problem areas will be discussed briefly, examples will be given, and remedies will be suggested. Most of these potential problems then can be either avoided or attenuated by advanced provisions so that they will not become fatal flaws to project completion

  12. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  13. Bioenergetics of the failing heart.

    Science.gov (United States)

    Ventura-Clapier, Renée; Garnier, Anne; Veksler, Vladimir; Joubert, Frédéric

    2011-07-01

    The heart is responsible for pumping blood throughout the blood vessels to the periphery by repeated, rhythmic contractions at variable intensity. As such the heart should permanently adjust energy production to energy utilization and is a high-energy consumer. For this the heart mainly depends on oxidative metabolism for adequate energy production and on efficient energy transfer systems. In heart failure, there is disequilibrium between the work the heart has to perform and the energy it is able to produce to fulfill its needs. This has led to the concept of energy starvation of the failing heart. This includes decreased oxygen and substrate supply, altered substrate utilization, decreased energy production by mitochondria and glycolysis, altered energy transfer and inefficient energy utilization. Mitochondrial biogenesis and its transcription cascade are down-regulated. Disorganization of the cytoarchitecture of the failing cardiomyocyte also participates in energy wastage. Finally, the failing of the cardiac pump, by decreasing oxygen and substrate supply, leads to a systemic energy starvation. Metabolic therapy has thus emerged as an original and promising approach in the treatment heart failure. This article is part of a Special Issue entitled: Mitochondria and Cardioprotection. PMID:20869993

  14. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  15. Diggers failing to become diggers

    DEFF Research Database (Denmark)

    Jensen, Lars

    Mining has in recent years emerged as a national discourse in Australia as the combined result of the mining boom and national anxieties over the GFC featured prominently in references to Australia as a failed competitive state (the folding of manufacturing, where the closure of car factories plays...... could be told: The SBS three part documentary series, Dirty Business (2013), and Robert Knox’s Boom: The Underground History of Australia, from Gold Rush to GFC (2013). My paper seeks to look at how these narratives project mining’s importance for the national imaginary, and how this projection may be...

  16. Application of Modbus Protocol in Security and Stability Control Device%Modbus协议在安全稳定控制装置中的应用

    Institute of Scientific and Technical Information of China (English)

    司庆华; 徐海波; 颜云松; 许高阳

    2016-01-01

    Modbus协议是应用非常广泛的现场总线之一,市场上有大量支持Modbus通信协议的触摸屏可选作安全稳定控制装置的人机界面.首先介绍Modbus通信协议应用于稳控装置的意义;然后提出一种利用Modbus通信协议的方法,实现安全稳定控制装置内部数据的通信,这种方法不仅使得人机界面更加友好,而且产品开发周期更短,产品可升级扩展性更好.%The Modbus protocol is one of the widely applied field buses. There are a large number of touch screens supporting Modbus protocol on the market, which can be used for human machine interface of security and stability control device. This paper firstly introduces the significance of Modbus protocol's application in the stability control device. Then a method of using Modbus communication protocol is proposed to realize the communication of the data in the security and stability control device. This method not only makes the human machine interface (HMI) more friendly, but also makes the product development cycle shorter, and the scalable extensibility of the product becomes better.

  17. Application of an Image Cytometry Protocol for Cellular and Mitochondrial Phenotyping on Fibroblasts from Patients with Inherited Disorders

    DEFF Research Database (Denmark)

    Fernandez-Guerra, Paula; Lund, Martin; Corydon, T J;

    2015-01-01

    Cellular phenotyping of human dermal fibroblasts (HDFs) from patients with inherited diseases provides invaluable information for diagnosis, disease aetiology, prognosis and assessing of treatment options. Here we present a cell phenotyping protocol using image cytometry that combines measurement...... mitochondrial parameters by image cytometry in HDFs from patients with inherited metabolic diseases.......Cellular phenotyping of human dermal fibroblasts (HDFs) from patients with inherited diseases provides invaluable information for diagnosis, disease aetiology, prognosis and assessing of treatment options. Here we present a cell phenotyping protocol using image cytometry that combines measurements...... of crucial cellular and mitochondrial parameters: (1) cell number and viability, (2) thiol redox status (TRS), (3) mitochondrial membrane potential (MMP) and (4) mitochondrial superoxide levels (MSLs). With our protocol, cell viability, TRS and MMP can be measured in one small cell sample and MSL on...

  18. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons....... We have implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single......; benchmarks show that the approach is practical....

  19. Analysis of the Transport Layer Security protocol

    OpenAIRE

    Firing, Tia Helene

    2010-01-01

    In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these prot...

  20. Internet of Things : Definition, applications and comparison of wifi-based communication protocols for implementation of an irrigation system

    OpenAIRE

    Bruse, Emelie

    2015-01-01

    The aim of this thesis work has been to explore the state of the art of the Internet of Things, IoT. Focus has been put on the role of communication protocols, or middleware, that enable communication between node and hub in the IoT architecture. A literature study has been carried out, where the state of the art of the IoT has been studied. A comparison of six different pieces of middleware has been made, to use as a reference when choosing between communication protocols for a distributed s...

  1. Stability Mechanisms of Laccase Isoforms using a Modified FoldX Protocol Applicable to Widely Different Proteins

    DEFF Research Database (Denmark)

    Christensen, Niels J.; Kepp, Kasper P.

    2013-01-01

    A recent computational protocol that accurately predicts and rationalizes protein multisite mutant stabilities has been extended to handle widely different isoforms of laccases. We apply the protocol to four isoenzymes of Trametes versicolor laccase (TvL) with variable lengths (498–503 residues) ....... Several sites near Cu, notably 79, 241, and 245, or near substrate, mainly 265, are identified that contribute to stability-function trade-offs, of relevance to the search for new proficient and stable variants of these important industrial enzymes....

  2. Protocol Additional to the Agreement Between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed in Vienna on 27 September 2007. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 27 September 2007, upon signature by the representatives of Burundi and the Agency

  3. Protocol Additional to the agreement between the Republic of Colombia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Colombia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 25 November 2004. It was signed in Vienna on 11 May 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 5 March 2009, the date on which the Agency received from Colombia written notification that Colombia's statutory and constitutional requirements for entry into force had been met

  4. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003

  5. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 22 March 2013, upon signature by the representatives of the Denmark and the Agency.

  6. Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non‑Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 16 April 2014 in Basseterre, Saint Kitts and Nevis, and on 19 May 2014 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 May 2014, upon signature by the representatives of Saint Kitts and Nevis and the Agency

  7. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  8. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  9. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  10. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  11. Protocol Additional to the agreement between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 13 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of South Africa and the Agency, i.e. on 13 September 2002

  12. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  13. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  14. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  15. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  16. Protocol Additional to the agreement between the Republic of Palau and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Palau and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 10 May 2005 in New York and 13 May 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 13 May 2005, upon signature by the representatives of Palau and the Agency

  17. Protocol additional to the agreement between the Republic of Mali and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Mali and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 12 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Mali and the Agency, i.e. on 12 September 2002

  18. Apparatus for inspecting failed fuel

    International Nuclear Information System (INIS)

    Object: To provide electrode rods on an inner surface of a shipper cap and pressure detectors in the form of microswitches on four sides of the outer surface thereof to positively set the shipper cap to the channel and to positively separate reactor water within the channel from ambient reactor water. Structure: When the shipper cap is set on the channel, the four sides of the cap come into contact with a grid plate to upwardly move each rod against a return spring, and each microswitch is actuated through contact to light the indicating lamp, after which air is fed into the shipper cap to move a water level of reactor water within the channel from the electrode, thus separating from the ambient reactor water for subsequent operation for inspecting failed fuel. (Kamimura, M.)

  19. Development of an eco-protocol for seaweed chlorophylls extraction and possible applications in dye sensitized solar cells

    Science.gov (United States)

    Armeli Minicante, S.; Ambrosi, E.; Back, M.; Barichello, J.; Cattaruzza, E.; Gonella, F.; Scantamburlo, E.; Trave, E.

    2016-07-01

    Seaweeds are a reserve of natural dyes (chlorophylls a, b and c), characterized by low cost and easy supply, without potential environmental load in terms of land subtraction, and also complying with the requirements of an efficient waste management policy. In particular, the brown seaweed Undaria pinnatifida is a species largely present in the Venice Lagoon area, and for it a removal strategy is actually mandatory. In this paper, we set-up an eco-protocol for the best extraction and preparation procedures of the pigment, with the aim of finding an easy and affordable method for chlorophyll c extraction, exploring at the same time the possibility of using these algae within local sustainable management integrated strategies, among which the possible use of chlorophylls as a dye source in dye sensitized solar cells (DSSCs) is investigated. Experimental results suggest that the developed protocols are useful to optimize the chlorophyll c extraction, as shown by optical absorption spectroscopy measurements. The DSSCs built with the chlorophyll extracted by the proposed eco-protocol exhibit solar energy conversion efficiencies are similar to those obtained following extraction protocols with larger environmental impacts.

  20. The Ontological Perspectives of the Semantic Web and the Metadata Harvesting Protocol: Applications of Metadata for Improving Web Search.

    Science.gov (United States)

    Fast, Karl V.; Campbell, D. Grant

    2001-01-01

    Compares the implied ontological frameworks of the Open Archives Initiative Protocol for Metadata Harvesting and the World Wide Web Consortium's Semantic Web. Discusses current search engine technology, semantic markup, indexing principles of special libraries and online databases, and componentization and the distinction between data and…

  1. A bridge between two conventions on civil liability for nuclear damage: The Joint Protocol relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    The adoption of the Joint Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and the NEA, was hailed as landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. The present article attempts to describe the history of the Joint Protocol during the many years it took to develop this link between the two conventions, to provide comment on its objectives and content, and to discuss some important questions related to its application

  2. 40 CFR 205.160-6 - Passing or failing under SEA.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Passing or failing under SEA. 205.160... failing under SEA. (a) A failing vehicle is one whose measured noise level is in excess of the applicable... vehicles is less than or equal to the number in Column A, the sample passes. (c) Pass or failure of an...

  3. Formal Verification of Quantum Protocols

    CERN Document Server

    Nagarajan, R; Nagarajan, Rajagopal; Gay, Simon

    2002-01-01

    We propose to analyse quantum protocols by applying formal verification techniques developed in classical computing for the analysis of communicating concurrent systems. One area of successful application of these techniques is that of classical security protocols, exemplified by Lowe's discovery and fix of a flaw in the well-known Needham-Schroeder authentication protocol. Secure quantum cryptographic protocols are also notoriously difficult to design. Quantum cryptography is therefore an interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information processing scenarios. The example we use is the quantum key distribution protocol proposed by Bennett and Brassard, commonly referred to as BB84. We present a model of the protocol in the process calculus CCS and the results of some initial analyses using the Concurrency Workbench of the New Century (CWB-NC).

  4. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...... end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that...... the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and...

  5. Rational Protocols

    Science.gov (United States)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  6. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study

    OpenAIRE

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-01-01

    Background: High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing o...

  7. Protocol: a rapid and economical procedure for purification of plasmid or plant DNA with diverse applications in plant biology

    Directory of Open Access Journals (Sweden)

    Li Li

    2010-01-01

    Full Text Available Abstract Research in plant molecular biology involves DNA purification on a daily basis. Although different commercial kits enable convenient extraction of high-quality DNA from E. coli cells, PCR and agarose gel samples as well as plant tissues, each kit is designed for a particular type of DNA extraction work, and the cost of purchasing these kits over a long run can be considerable. Furthermore, a simple method for the isolation of binary plasmid from Agrobacterium tumefaciens cells with satisfactory yield is lacking. Here we describe an easy protocol using homemade silicon dioxide matrix and seven simple solutions for DNA extraction from E. coli and A. tumefaciens cells, PCR and restriction digests, agarose gel slices, and plant tissues. Compared with the commercial kits, this protocol allows rapid DNA purification from diverse sources with comparable yield and purity at negligible cost. Following this protocol, we have demonstrated: (1 DNA fragments as small as a MYC-epitope tag coding sequence can be successfully recovered from an agarose gel slice; (2 Miniprep DNA from E. coli can be eluted with as little as 5 μl water, leading to high DNA concentrations (>1 μg/μl for efficient biolistic bombardment of Arabidopsis seedlings, polyethylene glycol (PEG-mediated Arabidopsis protoplast transfection and maize protoplast electroporation; (3 Binary plasmid DNA prepared from A. tumefaciens is suitable for verification by restriction analysis without the need for large scale propagation; (4 High-quality genomic DNA is readily isolated from several plant species including Arabidopsis, tobacco and maize. Thus, the silicon dioxide matrix-based DNA purification protocol offers an easy, efficient and economical way to extract DNA for various purposes in plant research.

  8. Design of the Network Monitoring Applications Using SNMP (Simple Network Management Protocol) with Early Warning System and Network Mapping

    OpenAIRE

    Muazam Nugroho; Achmad Affandi; Djoko Suprajitno Rahardjo

    2014-01-01

    Simple Network Management Protocol (SNMP) adalah sebuah protokol yang digunakan untuk kebutuhan monitoring pada jaringan komputer. Dalam bekerja, SNMP terdiri dari Network Management Station (NMS) atau manager dan SNMP agent. NMS berfungsi sebagai mesin pengolahan informasi dari perangkat-perangkat jaringan yang dipantau (yang disebut sebagai SNMP agent). SNMP agent  terimplementasi  pada manageable node seperti router, server, dan perangkat jaringan lainnya.Pada periode sebelumnya,di Laborat...

  9. A New Protocol and Lower Bounds for Quantum Coin Flipping

    OpenAIRE

    Ambainis, Andris

    2002-01-01

    We present a new protocol and two lower bounds for quantum coin flipping. In our protocol, no dishonest party can achieve one outcome with probability more than 0.75. Then, we show that our protocol is optimal for a certain type of quantum protocols. For arbitrary quantum protocols, we show that if a protocol achieves a bias of at most $\\epsilon$, it must use at least $\\Omega(\\log \\log \\frac{1}{\\epsilon})$ rounds of communication. This implies that the parallel repetition fails for quantum co...

  10. A technique for in vitro fit assessment of multi-unit screw-retained implant restorations: Application of a triple-scan protocol

    Science.gov (United States)

    Karl, Matthias; Wichmann, Manfred; Matta, Ragai E

    2012-01-01

    Recent advances in industrial non-contact scanners offer unprecedented opportunities for quality assessment of dental restorations. The majority of investigations published to date are limited to local two-dimensional results. A triple-scan protocol for virtual fit assessment of multi-unit screw-retained implant restorations is presented in this technical report. The advantages for application in biomechanical research include detailed three-dimensional information on internal component congruence in implant superstructures to be used in mathematical models. PMID:22924063

  11. Optimised to Fail: Card Readers for Online Banking

    Science.gov (United States)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  12. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  13. Application of a New TherApeutic Protocol Against Neospora Caninum-Induced Abortion in Cattle: A Field Study

    OpenAIRE

    G.Traldi; D. Lulla; Guerra, C; A. R. Attili; Preziuso, S.; L. Nisoli; Cuteri, V

    2005-01-01

    A field evaluation of a new therapeutic protocol based on Toltrazuril and/or Sulphadiazine and Trimethoprim was carried out for treatment of Neospora caninum-induced abortion in dairy cattle. 936 randomly chosen Friesian bovine belonging to 18 dairy herds of Central and South Italy with history of high number of abortions per year were considered. Since the high N. caninum seroprevalence, Sulphadiazine 200 mg/ml and Trimethoprim 40 mg/ml was given to the cattle at a dosage of 20 mg/kg bw, fol...

  14. A generic, flexible protocol for preimplantation human leukocyte antigen typing alone or in combination with a monogenic disease, for rapid case work-up and application.

    Science.gov (United States)

    Kakourou, Georgia; Destouni, Aspasia; Vrettou, Christina; Traeger-Synodinos, Jan; Kanavakis, Emmanuel

    2014-01-01

    Human leukocyte antigen (HLA) typing of in vitro fertilization (IVF) embryos, aims to establish a pregnancy that is HLA compatible with an affected sibling who requires hematopoietic stem cell transplantation (HSCT). It can be performed with or without preimplantation genetic diagnosis (PGD) for exclusion of a single-gene disorder (SGD) and it is a multistep, technically challenging procedure at every stage. Our purpose was to address the difficulties of genetic analysis by developing a fast, reliable and accurate PGD-HLA protocol, to simplify patient work-up and PGD application, while providing high flexibility for combination with any SGD. Requests included PGD-HLA for β-thalassemia (β-thal)/sickle cell disease (most common request), Diamond-Blackfan anemia (DBA), chronic granulomatous disease (CGD) and preimplantation-HLA typing only. For HLA haplotyping, we selected a panel of 26 short tandem repeats (STRs) distributed across the entire HLA locus, following PGD guidelines. When required, mutation detection was performed by both a direct and indirect approach. To support concurrent SGD exclusion and HLA typing, a one-step, single-tube, multiplex fluorescent touchdown-polymerase chain reaction (PCR) was optimized. The described touchdown-PCR was successfully applied for all PGD-HLA protocols. Eight clinical cycles were performed with a diagnosis achieved for 94.7% of amplified biopsied blastomeres. Embryo transfer took place in six cycles, with two pregnancies achieved and two healthy female infants (from a twin pregnancy) born so far. Our protocol enables HLA typing in a single PCR, reducing the risk of contamination and the cost, and providing faster results. It requires minimum optimization before clinical application, irrespective of the SGD involved, decreasing the waiting time from referral to treatment for all PGD-HLA cases. PMID:24131134

  15. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  16. Fast and easy protocol for the purification of recombinant S-layer protein for synthetic biology applications

    KAUST Repository

    Norville, Julie E.

    2011-06-17

    A goal of synthetic biology is to make biological systems easier to engineer. One of the aims is to design, with nanometer-scale precision, biomaterials with well-defined properties. The surface-layer protein SbpA forms 2D arrays naturally on the cell surface of Lysinibacillus sphaericus, but also as the purified protein in solution upon the addition of divalent cations. The high propensity of SbpA to form crystalline arrays, which can be simply controlled by divalent cations, and the possibility to genetically alter the protein, make SbpA an attractive molecule for synthetic biology. To be a useful tool, however, it is important that a simple protocol can be used to produce recombinant wild-type and modified SbpA in large quantities and in a biologically active form. The present study addresses this requirement by introducing a mild and non-denaturing purification protocol to produce milligram quantities of recombinant, active SbpA.

  17. When Neurons Fail - Technical Report

    OpenAIRE

    El Mhamdi, El Mahdi; Guerraoui, Rachid

    2016-01-01

    Neural networks have been traditionally considered robust in the sense that their precision degrades gracefully with failure of neurons and can be compensated by additional learning phases. Nevertheless, in a critical application such as flight control, for which neural networks are now appealing solutions, we require a high level of precision and cannot afford any additional learning at run-time. In this paper, we view a multilayer (often called "deep") neural network as a distributed system...

  18. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    International Nuclear Information System (INIS)

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met

  19. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  20. Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed in Vienna on 22 September 2005

  1. Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2010. It was signed on 7 October 2011 in Banjul, The Gambia, and on 18 October 2011 in Vienna, Austria

  2. Protocol Additional to the Agreement between the Government of the Republic of Turkey and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Turkey and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 6 July 2000

  3. Protocol Additional to the Agreement between the Republic of Panama and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Panama and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America (TLATELOLCO) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 29 November 2001. It was signed in the City of Panama on 11 December 2001

  4. Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 1997. It was signed in Vienna on 29 September 1997

  5. Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 September 2001. It was signed in Vienna on 5 December 2001

  6. Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 14 September 2004. It was signed on 9 December 2004 in Vienna

  7. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000

  8. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998

  9. Protocol Additional to the agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into force

    International Nuclear Information System (INIS)

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, the Additional Protocol entered into force on 28 June 2004, the date on which the Agency received from Armenia written notification that Armenia's statutory and/or constitutional requirements for entry into force had been met

  10. Text of a Protocol between the Agency and the Governments of Norway and the United States of America in Connection with the Application of Safeguards under a Co-Operation Agreement between the Two Governments

    International Nuclear Information System (INIS)

    The text of a protocol between the Agency and the Governments of Norway and the United States of America in connection with the application of safeguards under the Agreement for Co-operation between the Government of the United States of America and the Government of Norway Concerning Civil Uses of Atomic Energy signed on 4 May 1967, as amended, is reproduced herein for the information of all Members. The protocol entered into force on 25 September 1973 pursuant to Section 4.

  11. Protocol between the Democratic Republic of Congo and the International Atomic Energy Agency Additional to the Agreement for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Zaire and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT)1 is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 28 November 2002. It was signed in Vienna on 9 April 2003

  12. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  13. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  14. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  15. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  16. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  17. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  18. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  19. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  20. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria

  1. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  2. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna

  3. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  4. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  5. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  6. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  7. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna

  8. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria

  9. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  10. Design of the Network Monitoring Applications Using SNMP (Simple Network Management Protocol with Early Warning System and Network Mapping

    Directory of Open Access Journals (Sweden)

    Muazam Nugroho

    2014-03-01

    Full Text Available Simple Network Management Protocol (SNMP adalah sebuah protokol yang digunakan untuk kebutuhan monitoring pada jaringan komputer. Dalam bekerja, SNMP terdiri dari Network Management Station (NMS atau manager dan SNMP agent. NMS berfungsi sebagai mesin pengolahan informasi dari perangkat-perangkat jaringan yang dipantau (yang disebut sebagai SNMP agent. SNMP agent  terimplementasi  pada manageable node seperti router, server, dan perangkat jaringan lainnya.Pada periode sebelumnya,di Laboratorium Jaringan Telekomunikasi Jurusan Teknik Elektro ITS telah dibuat tiga sistem monitoring jaringan, yaitu network monitor yang dilengkapi dengan database, sistem peringatan dini, dan pemetaan jaringan (Network Mapping. Ketiga sistem ini masih berdiri sendiri, sehingga perlu dilakukan integrasi agar didapat suatu sistem yang memiliki fungsi lengkap.Dalam tugas akhir ini dilakukan perancangan dan pembuatan suatu Network Monitoring System yang merupakan integrasi antara Network Monitoring, Network Mapping, dan Sistem Peringatan Dini.

  11. Testing of toxicity based methods to develop site specific clean up objectives - phase 1: Toxicity protocol screening and applicability

    International Nuclear Information System (INIS)

    A study was conducted to develop a cost-effective and practical protocol for using bio-assay based toxicity assessment methods for remediation of decommissioned oil and gas production, and processing facilities. The objective was to generate site-specific remediation criteria for contaminated sites. Most companies have used the chemical-specific approach which, however, did not meet the ultimate land use goal of agricultural production. The toxicity assessment method described in this study dealt with potential impairment to agricultural crop production and natural ecosystems. Human health concerns were not specifically addressed. It was suggested that chemical-specific methods should be used when human health concerns exist. . Results showed that toxicity tests will more directly identify ecological stress caused by site contamination than chemical-specific remediation criteria, which can be unnecessarily protective. 11 refs., 7 tabs., 6 figs

  12. Application of MQTT Protocol to Instant Communicationin Mobile Internet%MQTT协议在移动互联网即时通信中的应用

    Institute of Scientific and Technical Information of China (English)

    马跃; 孙翱; 贾军营; 孙建伟; 于碧辉; 杨雪华

    2016-01-01

    移动互联网下的即时通信应用现今已经成为人们日常沟通必不可少的工具,然而作为其开发基础的即时通信协议却始终没有一个统一的标准,已有的即时通信协议都不能够很好的适应移动互联网网络环境不稳定,低带宽高延迟,设备计算能力差等特点.MQTT协议作为一种基于发布/订阅模型的轻量级消息传输协议,在移动平台具有节省流量和能耗,可扩展性强的优点.本文首先介绍了当前一些主流的即时通信协议,指出了它们在移动互联网环境下存在哪些缺陷;之后研究了MQTT协议的消息格式与使用方式,并与已有的即时通信协议进行了对比;最后基于MQTT协议,对即时通信应用的两项核心功能IM和Presence进行了设计和实现,并经过测试表明使用MQTT协议能够在移动互联网环境下提供比传统即时通信协议更少的带宽耗费和更良好的用户体验.%Instant communication applications in Mobile Internet have become an indispensable part for people's daily communication nowadays. The real-time communication protocol, which is the basis for the development of instant communication applications, however, has no unified standard. The existing real-time communication protocols are not able to perfectly adapt to mobile Internet, which has a constrained network environment with the characteristics of low-bandwidth, limited processing capabilities and high latency. MQTT is a publish/subscribe based, extremely simple and lightweight messaging protocol, whose design principle is to minimize the network bandwidth and device resource requirements. This article first introduces some existing mainstream instant communication protocols and points out their shortcomings in mobile Internet environment. The second part introduces MQTT protocol briefly and studies the format and interaction process of MQTT message. Finally, based on MQTT, the article puts forward an implementation of IM and

  13. Comparison between absorbed dose to water standards established by water calorimetry at the LNE-LNHB and by application of international air-kerma based protocols for kilovoltage medium energy x-rays

    International Nuclear Information System (INIS)

    Nowadays, the absorbed dose to water for kilovoltage x-ray beams is determined from standards in terms of air-kerma by application of international dosimetry protocols. New standards in terms of absorbed dose to water has just been established for these beams at the LNE-LNHB, using water calorimetry, at a depth of 2 cm in water in accordance with protocols. The aim of this study is to compare these new standards in terms of absorbed dose to water, to the dose values calculated from the application of four international protocols based on air-kerma standards (IAEA TRS-277, AAPM TG-61, IPEMB and NCS-10). The acceleration potentials of the six beams studied are between 80 and 300 kV with half-value layers between 3.01 mm of aluminum and 3.40 mm of copper. A difference between the two methods smaller than 2.1% was reported. The standard uncertainty of water calorimetry being below 0.8%, and the one associated with the values from protocols being around 2.5%, the results are in good agreement. The calibration coefficients of some ionization chambers in terms of absorbed dose to water, established by application of calorimetry and air-kerma based dosimetry protocols, were also compared. The best agreement with the calibration coefficients established by water calorimetry was found for those established with the AAPM TG-61 protocol. (paper)

  14. Is journalism failing on climate?

    Science.gov (United States)

    Rahmstorf, Stefan

    2012-12-01

    How can we build a reliable and affordable energy supply based on renewables? How rapidly do we need to cut greenhouse gas emissions to keep climate change within manageable bounds? What does it take to maintain a stable common currency of different nations? These are just a few examples of questions that are critical for our future and that require an understanding of complex systems—the energy system, the climate system, the financial system. Finding sound answers to these questions requires sophisticated scientific analysis and expert knowledge; a lay person's intuition will clearly not suffice. Yet, decisions in a democracy are (and should be!) taken by politicians and the voting public who are not usually scientific experts. Hence the well-being of our societies—and even more so the living conditions of future generations, which are defined by the decisions we take today—depends on the wider public being well informed about the state of scientific knowledge and discourse. The media are the most important means by which lay people obtain their information about science. Good science journalism is therefore a decisive factor for the long-term success of modern society. Good science journalism clearly must be critical journalism, and it requires journalists who know what is what, who can put things into a perspective, and who are able to make well-informed judgements. After all, the role of science journalism is not simply to act as a 'translator' who conveys the findings of scientists in a language understandable to lay people. Rather, good science journalism will provide the public with a realistic impression of what is well established in science and what are current 'hot topics', uncertainties and controversies. It will also discuss the methods and social context of the scientific endeavour. There is ample evidence that in the area of climate science, journalism too often is failing to deliver this realistic picture to its audience, despite many good

  15. Reasons why patients fail screening in Indian breast cancer trials

    Directory of Open Access Journals (Sweden)

    P Mahajan

    2015-01-01

    Full Text Available Introduction: An increased number of screen failure patients in a clinical trial increases time and cost required for the recruitment. Assessment of reasons for screen failure can help reduce screen failure rates and improve recruitment. Materials and Methods: We collected retrospective data of human epidermal growth factor receptor (HER2 positive Indian breast cancer patients, who failed screening for phase 3 clinical trials and ascertained their reasons for screen failure from screening logs. Statistical comparison was done to ascertain if there are any differences between private and public sites. Results: Of 727 patients screened at 14 sites, 408 (56.1% failed screening. The data on the specific reasons for screen failures was not available at one of the public sites (38 screen failures out of 83 screened patients. Hence, after excluding that site, further analysis is based on 644 patients, of which 370 failed screening. Of these, 296 (80% screen failure patients did not meet selection criteria. The majority -266 were HER2 negative. Among logistical issues, 39 patients had inadequate breast tissue sample. Sixteen patients withdrew their consent at private sites as compared to six at public sites. The difference between private and public sites for the above three reasons was statistically significant. Conclusion: Use of prescreening logs to reduce the number of patients not meeting selection criteria and protocol logistics, and patient counseling to reduce consent withdrawals could be used to reduce screen failure rate.

  16. Cryptanalysis of Song's advanced smart card based password authentication protocol

    CERN Document Server

    Tapiador, Juan E; Peris-Lopez, P; Clark, John A

    2011-01-01

    Song \\cite{Song10} proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng \\cite{XZF09}. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.

  17. Smoke and mirrors: the Kyoto Protocol and beyond

    NARCIS (Netherlands)

    Kooten, van G.C.

    2003-01-01

    The Kyoto Protocol is considered a necessary first step toward an effective future climate accord. As argued in this paper, however, the protocol will likely fail because it has too many loopholes, inadequate governance structures, and insufficient compliance provisions. This view is supported by ca

  18. When Organization Fails: Why Authority Matters

    DEFF Research Database (Denmark)

    Blaschke, Steffen

    2015-01-01

    Review of: James R. Taylor and Elizabeth J. Van Every / When Organization Fails: Why Authority Matters. (New York: Routledge, 2014. 220 pp. ISBN: 978 0415741668)......Review of: James R. Taylor and Elizabeth J. Van Every / When Organization Fails: Why Authority Matters. (New York: Routledge, 2014. 220 pp. ISBN: 978 0415741668)...

  19. Dosimetric consequences of the application of off-line setup error correction protocols and a hull-volume definition strategy for intensity modulated radiotherapy of prostate cancer

    International Nuclear Information System (INIS)

    Purpose: To evaluate the consequences of a planning volume definition based on multiple CTs and the application of off-line setup error correction for the treatment of prostate cancer with intensity-modulated radiotherapy (IMRT). Further, to compare various setup correction protocols (SCP) by their influence on the average dose distributions. Materials and methods: A planning target volume (PTV) consisting of the bounding volume of prostate contours of five CTs (CTVhull) plus an additional margin of 5 mm and a virtual Rectumhull volume (the solid bounding volume of the five corresponding rectum contours) are used for treatment planning. Simulations of treatment courses with the non-parametric bootstrap method allow to estimate the distribution of the expected equivalent uniform dose (EUD). The impact of off-line setup error correction protocols is evaluated based on estimated EUD distributions. Results: Off-line SCP allow to achieve the intended prostate and rectum EUD and a reliable coverage of the CTV despite the reduced margins. The EUD of the virtual hull volumes is a good estimate for the EUD of prostate and rectal wall. Conclusion: Treatment planning based on Rectumhull and CTVhull plus setup margin as PTV in combination with SCP results in a robust and safe IMRT planning concept

  20. Is journalism failing on climate?

    Science.gov (United States)

    Rahmstorf, Stefan

    2012-12-01

    How can we build a reliable and affordable energy supply based on renewables? How rapidly do we need to cut greenhouse gas emissions to keep climate change within manageable bounds? What does it take to maintain a stable common currency of different nations? These are just a few examples of questions that are critical for our future and that require an understanding of complex systems—the energy system, the climate system, the financial system. Finding sound answers to these questions requires sophisticated scientific analysis and expert knowledge; a lay person's intuition will clearly not suffice. Yet, decisions in a democracy are (and should be!) taken by politicians and the voting public who are not usually scientific experts. Hence the well-being of our societies—and even more so the living conditions of future generations, which are defined by the decisions we take today—depends on the wider public being well informed about the state of scientific knowledge and discourse. The media are the most important means by which lay people obtain their information about science. Good science journalism is therefore a decisive factor for the long-term success of modern society. Good science journalism clearly must be critical journalism, and it requires journalists who know what is what, who can put things into a perspective, and who are able to make well-informed judgements. After all, the role of science journalism is not simply to act as a 'translator' who conveys the findings of scientists in a language understandable to lay people. Rather, good science journalism will provide the public with a realistic impression of what is well established in science and what are current 'hot topics', uncertainties and controversies. It will also discuss the methods and social context of the scientific endeavour. There is ample evidence that in the area of climate science, journalism too often is failing to deliver this realistic picture to its audience, despite many good

  1. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  2. Learning from experience: improving the process of internationally educated nurses' application for registration — a study protocol

    OpenAIRE

    Giblin, Cathy; Lemermeyer, Gillian; Cummings, Greta; Wang, Mengzhe; Kwan, Jennifer Anne

    2015-01-01

    Abstract Aim This study aims to improve the efficiency of the application for registration process for internationally educated nurses seeking licensure to practice. Background The licensure and employment of internationally educated nurses has been one strategy to address the global nursing shortage. However, little is known about which application characteristics relate to success in obtaining licensure. Design This project uses evidence from a retrospective statistical analysis of four yea...

  3. Protocol Additional to the agreement between the Union of the Comoros and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Union of the Comoros and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed in Vienna on 13 December 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 January 2009, the date on which the Agency received from the Union of the Comoros written notification that Comoros' statutory and constitutional requirements for entry into force had been met

  4. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  5. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met

  6. Protocol Additional to the agreement between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Canada written notification that Canada's statutory and/or constitutional requirements for entry into force have been met, i.e. on 8 September 2000

  7. Protocol Additional to the agreement between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 5 July 2000. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Azerbaijan written notification that Azerbaijan's statutory and/or constitutional requirements for entry into force have been met, i.e. on 29 November 2000

  8. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 21 April 2011, the date on which the Agency received from the Kingdom of Morocco written notification that Morocco's statutory and constitutional requirements for entry into force had been met

  9. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  10. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  11. Protocol Additional to the agreement between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 28 September 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from the Czech Republic written notification that the Czech Republic's statutory and/or constitutional requirements for entry into force have been met, i.e. on 1 July 2002

  12. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  13. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  14. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  15. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  16. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  17. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met

  18. Protocol Additional to the agreement between the Republic of Chile and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Chile and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 19 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 November 2003, the date on which the Agency received from Chile written notification that Chile's statutory and/or constitutional requirements for entry into force had been met

  19. Failed delivery and daily Treasury bill returns

    OpenAIRE

    Ramon P. DeGennaro; James T. Moser

    1990-01-01

    If the seller of a Treasury bill does not provide timely and correct delivery instructions to the clearing bank, the bank does not deliver the security. Further, the seller is not paid until this "failed delivery" is rectified. Since the purchase price is not changed, these "fails" generate interest-free loans from the seller to the buyer. ; This paper studies the effect of failed delivery on Treasury-bill prices. We find that investors bid prices to a premium to reflect the possibility of ob...

  20. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  1. Securing VOIP networks via Transport protocols Layer

    Directory of Open Access Journals (Sweden)

    M. M. Moon

    2012-09-01

    Full Text Available Voice over Internet Protocol (VoIP, is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog phone line. VoIP services have compelling technical advantages over circuit switching. VoIP networks are based more on an open architecture than that of their circuit-switched contemporaries. This open, standards-based architecture means that VoIP services are more interchangeable and more modular than that of a proprietary, monolithic voice switch. One can now select best-in-class products without being tied to one specific vendor. Open standards also translates into the realization of new services that one can rapidly develop and deploy rather than waiting for a particular vendor to develop a proprietary solution. Moreover, VoIP is suitable for CTI (Computer Telephony Integration and other next-generation applications, which are insightful when looking to future networks that, provide enhanced services. VoIP traffic has a number of issues that should be carefully considered, such as traffic parameters and network design. Without such due diligence, one could be faced with service that does not function reliably or is severely degraded. These important considerations are Latency, Jitter, Bandwidth, Packet Loss, Reliability & Security. In this paper, the focus shall be on the Security aspect, its threat and measures to prevent it on various layers of the VOIP protocol. One of the common mistakes when approaching Voice over IP Security is to treat this technology and its applications like all other network-based applications and therefore use classical security measures. This approach fails to consider the fundamental property that makes VoIP different from classical network-aware technologies: Voice over IP is time critical. It demands Quality of Service (QoS and is generally deployed over an environment where QoS does not exist as a standard feature. In this proposed research, we examine

  2. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    DEFF Research Database (Denmark)

    Burgy, Laurent; Reveillere, Laurent; Lawall, Julia Laetitia;

    2007-01-01

    demand. Zebu-based applications are also robust, as the Zebu compiler automatically checks specification consistency and generates parsing stubs that include validation of the message structure. Using a message torture suite in the context of SIP and RTSP, we show that Zebu-generated code is both...

  3. B Vitamins Fail to Prevent Alzheimer's

    Science.gov (United States)

    ... ARTICLES CLICK HERE B Vitamins Fail to Prevent Alzheimer’s Many people take B vitamins in the hopes ... Finder See All articles W e can end Alzheimer's Support the pioneering research of Nobel Laureate Dr. ...

  4. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life Using a Smartphone Application

    Science.gov (United States)

    Mareva, Silvana; Thomson, David; Marenco, Pietro; Estal Muñoz, Víctor; Ott, Caroline V.; Schmidt, Barbara; Wingen, Tobias; Kassianos, Angelos P.

    2016-01-01

    Health-Related Quality of Life (HRQoL) is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2 weeks, they will complete a retrospective assessment of their HRQoL and they will provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same 2-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g., mood, activities), the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for routine HRQoL assessment. The direct comparison of real

  5. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life Using a Smartphone Application.

    Science.gov (United States)

    Mareva, Silvana; Thomson, David; Marenco, Pietro; Estal Muñoz, Víctor; Ott, Caroline V; Schmidt, Barbara; Wingen, Tobias; Kassianos, Angelos P

    2016-01-01

    Health-Related Quality of Life (HRQoL) is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2 weeks, they will complete a retrospective assessment of their HRQoL and they will provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same 2-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g., mood, activities), the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for routine HRQoL assessment. The direct comparison of real

  6. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  7. Application of the Intervention Mapping protocol to develop Keys, a family child care home intervention to prevent early childhood obesity

    OpenAIRE

    Mann, Courtney M.; Ward, Dianne S.; Vaughn, Amber; Benjamin Neelon, Sara E.; Long Vidal, Lenita J.; Omar, Sakinah; Namenek Brouwer, Rebecca J.; Østbye, Truls

    2015-01-01

    Background Many families rely on child care outside the home, making these settings important influences on child development. Nearly 1.5 million children in the U.S. spend time in family child care homes (FCCHs), where providers care for children in their own residences. There is some evidence that children in FCCHs are heavier than those cared for in centers. However, few interventions have targeted FCCHs for obesity prevention. This paper will describe the application of the Intervention M...

  8. Effectiveness of a smartphone application for improving healthy lifestyles, a randomized clinical trial (EVIDENT II) : study protocol

    OpenAIRE

    Recio Rodríguez, Jose I.; Martín Cantera, Carlos; González Viejo, Natividad; Gómez Arranz, Amparo; Arietaleanizbeascoa, Maria S.; Schmolling Guinovart, Yolanda; Maderuelo Fernández, José Ángel; Pérez Arechaederra, Diana; Rodriguez-Sanchez, Emiliano; Gómez Marcos, Manuel Ángel; García Ortiz, Luís

    2014-01-01

    Background: New technologies could facilitate changes in lifestyle and improve public health. However, no large randomized, controlled studies providing scientific evidence of the benefits of their use have been made. The aims of this study are to develop and validate a smartphone application, and to evaluate the effect of adding this tool to a standardized intervention designed to improve adherence to the Mediterranean diet and to physical activity. An evaluation is also made of the effect o...

  9. A tailored, interactive health communication application for patients with type 2 diabetes: study protocol of a randomised controlled trial

    OpenAIRE

    Weymann, Nina; Härter, Martin; Dirmaier, Jörg

    2013-01-01

    Background Type 2 diabetes is an increasingly common chronic condition whose prognosis can be improved by patient involvement and self-management. Patient involvement can be fostered by web-based Interactive Health Communication Applications (IHCAs) combining health information with decision support, social support and/or behaviour change support. They reach great numbers of patients at low cost and provide high-quality information and support at the time, place and learning speed patients pr...

  10. Experience of the application of the 'Spanish Protocol' for the radiological surveillance and control of scrap and the metallic products resulting from its processing

    International Nuclear Information System (INIS)

    joining the Protocol. The actions performed since the incident in 1998 that led to the initiative of establishing the Protocol have allowed more than 100 radioactive sources to be recovered without processing, in addition to more than 900 miscellaneous materials with radioactive content, mainly of natural origin. The article further reports on the Spanish experience and on the recent relevant international developments including the European Union (EU), the International Atomic Energy Agency (IAEA), the United Nations Economic Commission for Europe (UNECE) and The World Customs Organization (WCO). The most noteworthy recent development emerges most clearly in the issuing of the EU Council's Directive 2003/122/Euratom of 2003-12-22 on the control of high activity sealed radioactive sources and orphan sources, in relation to the need to establish systems for the detection of orphan sources in large stores and recycling facilities for metallic scrap. Additionally it is good to recall the European Council Resolution on the establishment of national systems for surveillance and control of the presence of radioactive material in the recycling of metallic materials in the EU Member States (2002). The most noteworthy recent development has been the approval by the IAEA Board of Governors of the Code of Conduct on the Safety and Security of Radioactive Sources, which has now been signed by 28 countries and for which application guidelines are currently being prepared. Specifically interesting has been the recent publication of Safety Guide RS-G-1.7 (Application of the Concepts of Exclusion, Exemption and Clearance). In 2001, the UNECE published a report on Management of Radiation Protection in the Recycling of Metal Scrap. As a follow-up, a Group of Experts on Monitoring of Radioactively Contaminated Scrap Metal was convened by the UNECE in Geneva (5-7 April 2004). In 1998, the IAEA and the WCO established a Memorandum of Understanding, and training efforts for customs officers

  11. Protocol for an electrospray ionization tandem mass spectral product ion library: development and application for identification of 240 pesticides in foods.

    Science.gov (United States)

    Zhang, Kai; Wong, Jon W; Yang, Paul; Hayward, Douglas G; Sakuma, Takeo; Zou, Yunyun; Schreiber, André; Borton, Christopher; Nguyen, Tung-Vi; Kaushik, Banerjee; Oulkar, Dasharath

    2012-07-01

    Modern determination techniques for pesticides must yield identification quickly with high confidence for timely enforcement of tolerances. A protocol for the collection of liquid chromatography (LC) electrospray ionization (ESI)-quadruple linear ion trap (Q-LIT) mass spectrometry (MS) library spectra was developed. Following the protocol, an enhanced product ion (EPI) library of 240 pesticides was developed by use of spectra collected from two laboratories. A LC-Q-LIT-MS workflow using scheduled multiple reaction monitoring (sMRM) survey scan, information-dependent acquisition (IDA) triggered collection of EPI spectra, and library search was developed and tested to identify the 240 target pesticides in one single LC-Q-LIT MS analysis. By use of LC retention time, one sMRM survey scan transition, and a library search, 75-87% of the 240 pesticides were identified in a single LC/MS analysis at fortified concentrations of 10 ng/g in 18 different foods. A conventional approach with LC-MS/MS using two MRM transitions produced the same identifications and comparable quantitative results with the same incurred foods as the LC-Q-LIT using EPI library search, finding 1.2-49 ng/g of either carbaryl, carbendazim, fenbuconazole, propiconazole, or pyridaben in peaches; carbendazim, imazalil, terbutryn, and thiabendazole in oranges; terbutryn in salmon; and azoxystrobin in ginseng. Incurred broccoli, cabbage, and kale were screened with the same EPI library using three LC-Q-LIT and a LC-quadruple time-of-flight (Q-TOF) instruments. The library search identified azoxystrobin, cyprodinil, fludioxinil, imidacloprid, metalaxyl, spinosyn A, D, and J, amd spirotetramat with each instrument. The approach has a broad application in LC-MS/MS type targeted screening in food analysis. PMID:22686274

  12. Wifi, WiMax and LTE multi-hop mesh networks basic communication protocols and application areas

    CERN Document Server

    Wei, Hung-Yu; Dixit, Sudhir

    2013-01-01

    Wifi, WiMAX, and Cellular Multihop Networks presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in

  13. TinyCoAP: A Novel Constrained Application Protocol (CoAP Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS

    Directory of Open Access Journals (Sweden)

    Anna Calveras

    2013-05-01

    Full Text Available In this paper we present the design and implementation of the Constrained Application Protocol (CoAP for TinyOS, which we refer to as TinyCoAP. CoAP seeks to apply the same application transfer paradigm and basic features of HTTP to constrained networks, while maintaining a simple design and low overhead. The design constraints of Wireless Sensor Networks (WSNs require special attention in the design process of the CoAP implementation. We argue that better performance and minimal resource consumption can be achieved developing a native library for the operating system embedded in the network. TinyOS already includes in its distribution an implementation of CoAP called CoapBlip. However, this is based on a library not originally designed to meet the requirements of TinyOS. We demonstrate the effectiveness of our approach by a comprehensive performance evaluation. In particular, we test and evaluate TinyCoAP and CoapBlip in a real scenario, as well as solutions based on HTTP. The evaluation is performed in terms of latency, memory occupation, and energy consumption. Furthermore, we evaluate the reliability of each solution by measuring the goodput obtained in a channel affected by Rayleigh fading. We also include a study on the effects that high workloads have on a server.

  14. CLINICAL EVALUATION OF FAILED ENDONASAL DCR OPERATIONS AND THEIR MANAGEMENT

    OpenAIRE

    Mohammed Naveed; Muneeruddin Ahmed; Mahendra Kumar; Ramakrishna; Siva Prasad; Boddikuri

    2014-01-01

    INTRODUCTION: Endoscopic Intra nasal approach to by-pass the obstruction of lacrimal apparatus is a simple and commonly practiced surgery among the ENT Surgeons. Various modifications in the form of usage of micro drill, application of Mitomycin C and preserving the nasal flap to line the opening in the sac to name a few are being used. Recurrence of epiphora and closure of the neo opening is described and observed are labeled as failed endonasal DCR. This study makes an a...

  15. Management of adults with prior failed hypospadias surgery.

    Science.gov (United States)

    Craig, James R; Wallis, Chad; Brant, William O; Hotaling, James M; Myers, Jeremy B

    2014-06-01

    Hypospadias is one of the most prevalent anomalies of the male genitalia. Contemporary hypospadias repair is very successful, but patients that have the surgery fail often require multiple surgeries throughout their life. Complications from failed hypospadias repairs have a significant impact on patients both psychologically and physically. Failed hypospadias repair encompasses a spectrum of problems that include hypospadias recurrence with an ectopic meatus, urethral fistula, urethral stricture, and ventral penile curvature. Repairs of hypospadias complications can be challenging due to the poor quality of surrounding tissue from disruption of normal vasculature in the re-operative field associated with the underlying disorder. One of the most challenging issues is dealing with urethral strictures. There have been multiple methods described at repairs of these in both a single stage and multiple staged procedures. Particular attention has been directed towards applications of grafts due to worse outcomes with flaps. Buccal mucosa has emerged as the leading graft material in staged repairs. When counseling patients with failed hypospadias it is important to discuss the expected outcome as repairs directed towards a terminally positioned meatus with a straight phallus may require multiple surgeries due to post-operative complications as well as the necessity of proceeding in a staged approach. PMID:26816767

  16. The Text of the Agreement between of 4 April 1975 between the Agency, Israel and the United States of America for the Application of Safeguards. Protocol Prolonging the Agreement

    International Nuclear Information System (INIS)

    The text of the Protocol of 7 April 1977 prolonging the Agreement of 4 April 1975 between the Agency, Israel and the United States of America for the application of safeguards is reproduced in this document for the information of all Members

  17. Nursing Students' Opinion on the Use of Smartphone Applications (Apps) in Clinical Education and Training: A Study Protocol.

    Science.gov (United States)

    O'Connor, Siobhan; Andrews, Tom

    2016-01-01

    Nurse educators are exploring different mobile technologies to provide additional support to nursing students in clinical practice. However, the view of nursing students on the use of smartphone applications (apps) to enhance clinical education has not been explored. This proposed study will use a self-reported questionnaire to examine the opinions of nursing students on the current and potential use of smartphone apps when training in clinical settings. Descriptive and inferential statistics will be performed on the quantitative data. Qualitative data from open ended questions will be thematically analysed using the framework approach. This will be the first study to examine the use of smartphone apps as a support in clinical teaching from a students' perspective. Their opinion is vital if the right mobile technology is to be designed and implemented. PMID:27332464

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  19. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  20. SCRUTINY OF BROADCASTING PROTOCOLS IN VANET

    OpenAIRE

    Rohini Nere; Uma Nagaraj

    2015-01-01

    Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protoc...

  1. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Armenia and the IAEA for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). It was approved by the Board of Governors on 23 September 1997, signed in Vienna on 29 September 1997, and it will enter into force on the date the Agency receives written notification that Armenia's statutory and/or constitutional requirements for entry into force have been met. Pending entry into force, this Protocol shall apply provisionally from the date of signature, i.e., 29 September 1997

  2. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele;

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  3. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele; Degano, Pierpablo; Nielson, Flemming; Nielson, Hanne Riis; Priami, Corrado

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  4. 多源交互式应用层组播路由协议%Multi-Source Interactive Application Layer Multicast Routing Protocol

    Institute of Scientific and Technical Information of China (English)

    高建敏; 陆慧梅; 曹元大

    2011-01-01

    Application layer multicast (ALM) without expanding the basic underlying network can support greater range of multicast communications, which makes it a popular mechanism for multicast applications.However, compared with the traditional IP multicast, ALM has larger network delay and the node stability is poor, which makes it become a unique and challenging problem to implement multi-source interactive multicast application.In this paper, an ALM protocol called Thunder is proposed.According to the roles of members in the group, Thunder divides the interactive group into core-network and peripheral-tree.The core-network consists of the multicast data sources.By using Mesh-Tree structure, it constructs an optimal distribution tree for each data source and pursues fast forwarding to optimize the interactive process.The peripherals-tree is a tree structure composed by the unstable members which just receive data or only produce a small amount of data.Additionally,Peripherals-tree structure allows more members to receive multicast data.Those unstable nodes will not influence the interaction process of core-network, so the response speed and the protocol scalability of the interactive process are improved.Experiments demonstrate that Thunder can decrease network delay of interactive ALM and improve the scalability, which makes the multi-source interactive multicast applications be deployed and implemented more easily.%应用层组播无需扩充底层基础网络就可以实现较大范围的组播通信,已成为倍受瞩目的组播实现机制.但相对于传统的IP组播,应用层组播的网络延迟大,节点稳定性差,使得采用应用层组播来实现多源交互式组播应用成为一个独特的具有挑战性的问题.Thunder协议将组播结构分为核心网和外围树两部分:核心网通过Mesh-Tree结构追求快速转发以优化交互式过程;外围树允许更多的成员接收组播数据,却不会对交互过程产生影响,可提高协议

  5. Thick Film Fail-Safe Resistors

    OpenAIRE

    Wojcicka, D. L.; St. Nowak

    1983-01-01

    The investigations of low resistance thick film fail-safe resistors are presented. Particularly the shape of a resistive path; the temperature of the central part of the resistor while increasing the power up to 4 Watts; the kind of composition material for the resistive path vs. extensometer effect, and the stability of the resistor are discussed.

  6. Merger incentives and the failing firm defense

    NARCIS (Netherlands)

    Bouckaert, J.M.C.; Kort, P.M.

    2014-01-01

    The merger incentives between profitable firms differ fundamentally from the incentives of a profitable firm to merge with a failing firm. We investigate these incentives under different modes of price competition and Cournot behavior. Our main finding is that firms strictly prefer exit of the faili

  7. Failed Citizenship, Civic Engagement, and Education

    Science.gov (United States)

    Banks, James A.

    2015-01-01

    Many racial, ethnic, cultural, linguistic, and religious groups are denied structural inclusion into their nation-state. Consequently, they do not internalize the values and symbols of the nation-state, develop a strong identity with it, or acquire political efficacy. The author conceptualizes this process as "failed citizenship,"…

  8. Contested Spaces of a "Failing" Elementary School

    Science.gov (United States)

    Kawai, Roi; Serriere, Stephanie; Mitra, Dana

    2014-01-01

    Amid the recent proliferation of teacher-led movements resisting high-stakes testing across the United States, the authors identify how a "failing" elementary school reclaimed local discourse by taking political action against top-down measures. Framed as competing modes of school reform, the authors offer the sociocultural framework of…

  9. A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    CERN Document Server

    Syamsuddin, Irfan; Chang, Elizabeth; Han, Song; 10.1109/ICCIT.2008.314

    2010-01-01

    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

  10. MTP: An atomic multicast transport protocol

    Science.gov (United States)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  11. A Study of Voice over Internet Protocol

    OpenAIRE

    Mohsen Gerami

    2010-01-01

    Voice over Internet Protocol, is an application that enables data packet networks to transport real time voice traffic. VOIP uses the Internet as the transmission network. This paper describes VoIP and its requirements. The paper further discusses various VoIP protocol, security and its market.

  12. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  13. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  14. A Survey on Low-cost RFID Authentication Protocols

    CERN Document Server

    Syamsuddin, Irfan; Potdar, Vidyasagar; Dillon, Tharam

    2010-01-01

    This paper presents a survey on several RFID authentication protocols under low cost restrictions. Low cost RFID are mainly addressed with limited security and privacy protections. In this study, we explore several protocols with various authentication mechanisms found in literature that satisfy low cost restrictions. Assessments of these protocols are based on data protection, tracking protection, forward security. Finally, it is concluded that no single low cost RFID protocol fully meets the requirement of the given assessments. While a protocol satisfies one or two assessments, it fails to fully meet the requirement of the third assessment. This study provides a new insight in RFID literature which can be used particularly by small and medium industries to choose the appropriate RFID protocol for their needs.

  15. Analysis of failed nuclear plant components

    Science.gov (United States)

    Diercks, D. R.

    1993-12-01

    Argonne National Laboratory has conducted analyses of failed components from nuclear power- gener-ating stations since 1974. The considerations involved in working with and analyzing radioactive compo-nents are reviewed here, and the decontamination of these components is discussed. Analyses of four failed components from nuclear plants are then described to illustrate the kinds of failures seen in serv-ice. The failures discussed are (1) intergranular stress- corrosion cracking of core spray injection piping in a boiling water reactor, (2) failure of canopy seal welds in adapter tube assemblies in the control rod drive head of a pressurized water reactor, (3) thermal fatigue of a recirculation pump shaft in a boiling water reactor, and (4) failure of pump seal wear rings by nickel leaching in a boiling water reactor.

  16. Analysis of failed nuclear plant components

    International Nuclear Information System (INIS)

    Argonne National Laboratory has conducted analyses of failed components from nuclear power generating stations since 1974. The considerations involved in working with and analyzing radioactive components are reviewed here, and the decontamination of these components is discussed. Analyses of four failed components from nuclear plants are then described to illustrate the kinds of failures seen in service. The failures discussed are (a) intergranular stress corrosion cracking of core spray injection piping in a boiling water reactor, (b) failure of canopy seal welds in adapter tube assemblies in the control rod drive head of a pressure water reactor, (c) thermal fatigue of a recirculation pump shaft in a boiling water reactor, and (d) failure of pump seal wear rings by nickel leaching in a boiling water reactor

  17. Gravitational wave triggered searches for failed supernovae

    Science.gov (United States)

    Annis, James; Dark Energy Survey Collaboration

    2016-03-01

    Stellar core collapses occur to all stars of sufficiently high mass and often result in supernovae. A small fraction of supergiant stars, however, are thought to collapse directly into black holes without producing supernovae. A survey of such ``failed'' supernovae would require monitoring millions of supergiants for several years. That is very challenging even for current surveys. With the start of the Advanced LIGO science run, we investigate the possibility of detecting failed supernovae by looking for missing supergiants associated with gravitational wave triggers. We use the Dark Energy Camera (DECam). Our project is a joint effort between the community and the Dark Energy Survey (DES) collaboration. In this talk we report on our ongoing efforts and discuss prospects for future searches.

  18. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...

  19. Rehabilitate Failing Park Sewage System Environmental Assessment

    OpenAIRE

    United States Department of the Interior, National Park Service

    2010-01-01

    The National Park Service (NPS) proposes to rehabilitate the failing sewage system within Bryce Canyon National Park, Utah. The rehabilitation would provide a safe, healthy, and functional environment, and maintain public health and future service for park visitors and staff. Portions of the sanitary sewage collection system were originally constructed in 1958 of clay pipe and currently service the lodge, staff housing, and visitor center before feeding into sewage treatment lagoons. Secti...

  20. Cognitive emotion regulation fails the stress test

    OpenAIRE

    Raio, Candace M.; Orederu, Temidayo A.; Palazzolo, Laura; Shurick, Ashley A.; Phelps, Elizabeth A.

    2013-01-01

    Cognitive emotion regulation has been widely shown in the laboratory to be an effective way to alter the nature of emotional responses. Despite its success in experimental contexts, however, we often fail to use these strategies in everyday life where stress is pervasive. The successful execution of cognitive regulation relies on intact executive functioning and engagement of the prefrontal cortex, both of which are rapidly impaired by the deleterious effects of stress. Because it is specific...

  1. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  2. Smoke and mirrors: the Kyoto Protocol and beyond

    OpenAIRE

    Kooten, van, G.C.

    2003-01-01

    The Kyoto Protocol is considered a necessary first step toward an effective future climate accord. As argued in this paper, however, the protocol will likely fail because it has too many loopholes, inadequate governance structures, and insufficient compliance provisions. This view is supported by case studies of Canada, Japan, and the Netherlands. These countries are unlikely to achieve their self-imposed targets, or, if they do, the costs of compliance will be unacceptably high. Consequently...

  3. The Kyoto protocol : Russian opportunities: OIES paper: RIIA Briefing Note

    OpenAIRE

    Müller, Benito

    2004-01-01

    Much, possibly too much, of the most recent debate on Russian ratification of the Kyoto Protocol has centred around the issue whether the Kyoto emission limit would hinder Russian economic growth, particularly in the context of the ambitious decadal Russian growth targets. The aim of this paper is to return the focus of the debate to the opportunities which the Kyoto Protocol could afford the Russian economy and which would be lost if Russia fails to grasp them by bringing the ...

  4. Electrophysiology of Heart Failure Using a Rabbit Model: From the Failing Myocyte to Ventricular Fibrillation

    Science.gov (United States)

    Liu, Michael; Qu, Zhilin; Weiss, James N.; Ennis, Daniel B.; Klug, William S.; Garfinkel, Alan

    2016-01-01

    Heart failure is a leading cause of death, yet its underlying electrophysiological (EP) mechanisms are not well understood. In this study, we use a multiscale approach to analyze a model of heart failure and connect its results to features of the electrocardiogram (ECG). The heart failure model is derived by modifying a previously validated electrophysiology model for a healthy rabbit heart. Specifically, in accordance with the heart failure literature, we modified the cell EP by changing both membrane currents and calcium handling. At the tissue level, we modeled the increased gap junction lateralization and lower conduction velocity due to downregulation of Connexin 43. At the biventricular level, we reduced the apex-to-base and transmural gradients of action potential duration (APD). The failing cell model was first validated by reproducing the longer action potential, slower and lower calcium transient, and earlier alternans characteristic of heart failure EP. Subsequently, we compared the electrical wave propagation in one dimensional cables of healthy and failing cells. The validated cell model was then used to simulate the EP of heart failure in an anatomically accurate biventricular rabbit model. As pacing cycle length decreases, both the normal and failing heart develop T-wave alternans, but only the failing heart shows QRS alternans (although moderate) at rapid pacing. Moreover, T-wave alternans is significantly more pronounced in the failing heart. At rapid pacing, APD maps show areas of conduction block in the failing heart. Finally, accelerated pacing initiated wave reentry and breakup in the failing heart. Further, the onset of VF was not observed with an upregulation of SERCA, a potential drug therapy, using the same protocol. The changes introduced at the cell and tissue level have increased the failing heart’s susceptibility to dynamic instabilities and arrhythmias under rapid pacing. However, the observed increase in arrhythmogenic potential is

  5. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  6. Efficient decentralized consensus protocols

    Science.gov (United States)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  7. A rapid and versatile combined DNA/RNA extraction protocol and its application to the analysis of a novel DNA marker set polymorphic between Arabidopsis thaliana ecotypes Col-0 and Landsberg erecta

    Directory of Open Access Journals (Sweden)

    Coupland George

    2005-08-01

    Full Text Available Abstract Background Many established PCR-based approaches in plant molecular biology rely on lengthy and expensive methods for isolation of nucleic acids. Although several rapid DNA isolation protocols are available, they have not been tested for simultaneous RNA isolation for RT-PCR applications. In addition, traditional map-based cloning technologies often use ill-proportioned marker regions even when working with the model plant Arabidopsis thaliana, where the availability of the full genome sequence can now be exploited for the creation of a high-density marker systems. Results We designed a high-density polymorphic marker set between two frequently used ecotypes. This new polymorphic marker set allows size separation of PCR products on agarose gels and provides an initial resolution of 10 cM in linkage mapping experiments, facilitated by a rapid plant nucleic acid extraction protocol using minimal amounts of A. thaliana tissue. Using this extraction protocol, we have also characterized segregating T-DNA insertion mutations. In addition, we have shown that our rapid nucleic acid extraction protocol can also be used for monitoring transcript levels by RT-PCR amplification. Finally we have demonstrated that our nucleic acid isolation method is also suitable for other plant species, such as tobacco and barley. Conclusion To facilitate high-throughput linkage mapping and other genomic applications, our nucleic acid isolation protocol yields sufficient quality of DNA and RNA templates for PCR and RT-PCR reactions, respectively. This new technique requires considerably less time compared to other purification methods, and in combination with a new polymorphic PCR marker set dramatically reduces the workload required for linkage mapping of mutations in A. thaliana utilizing crosses between Col-0 and Landsberg erecta (Ler ecotypes.

  8. EFFICIENT ALGORITHMS TO ENHANCE RECOVERY SCHEMA IN LINK STATE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Radwan S. Abujassar

    2011-08-01

    Full Text Available With the increasing demands for real-time applications traffic in net- works such as video and voice a highconvergence time for the existing routing protocols when failure occurred is required. These applicationscan be very sensitive to packet loss when link/node goes down. In this paper, we propose two algorithmsschemas for the link state protocol to reroute the traffic in two states; first, pre-calculated an alternativeand disjoint path with the primary one from the source to the destination by re-routing traffic through it,regardless of the locations of failure and the number of failed links. Second, rerouting the traffic via analternative path from a node whose local link is down without the need to wait until the source node knowsabout the failure. This is achieved by creating a new backup routing table based on the original routingtable which is computed by the dijkstra algorithm. The goal of these algorithms is to reduce loss of packets,end-to-end delay time, improve throughput and avoiding local loop when nodes re-converge the topologyin case of failure.

  9. The obscure future of the Kyoto protocol

    OpenAIRE

    Tsayem Demaze, Moise

    2013-01-01

    Since it came into effect in 2005 followed by its first period of application from 2008 to 2012, the Kyoto protocol has been subject to debates and international negotiations about its post-2012 future. Many grey areas persist, even though the Durban conference, held in December 2011, and the Doha conference, held in December 2012, ratified the principle of a second period of application of the protocol and started negotiations for a new international treaty supposed to come into effect in 2020.

  10. Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 4 April 2000

  11. Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 24 March 1999, signed in Vienna on 29 September 1999, and entered into force on 16 May 2000

  12. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Amendment of Article 17

    International Nuclear Information System (INIS)

    The document reproduces the amendment to the Article 17 of the Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. The amendment was approved by the Board of Governors in June 1999, and entered into force on 10 September 1999

  13. Protocol Additional the the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and entered into force on 6 July 2000

  14. Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 23 September 1997, signed in Vienna on 30 September 1997, and entered into force on 5 May 2000

  15. The Application of Cytidyl Guanosyl Oligodeoxynucleotide Can Affect the Antitumor Immune Response Induced by a Combined Protocol of Cryoablation and Dendritic Cells in Lewis Lung Cancer Model.

    Science.gov (United States)

    Zhang, Mi; Yin, Tianquan; Lu, Yuan; Feng, Huasong

    2016-01-01

    BACKGROUND Recently, several combined therapeutic strategies and targeted agents have been under investigation for their potential role in lung cancer. The combined administration of dendritic cells (DCs) and immune-adjuvant cytidyl guanosyl oligodeoxynucleotide (CpG-ODN) after cryosurgery has proven to be an effective strategy for treating lung cancer. However, whether the application of CpG-ODN could affect the therapeutic results remained to be further explored. MATERIAL AND METHODS The Lewis lung cancer (LLC)-bearing mice received cryoablation and injection of ex vivo-cultured DCs into the peritumoral zone. Subsequently, CpG-ODN was administered to experimental animals 6 hours, 12 hours, and 24 hours after DC injection. The mice in the control group received coadministration of DCs and CpG-ODN simultaneously. Therapeutic effects were evaluated by survival rates. The resistance to rechallenge of LLC cell was assessed by lung metastasis and in vitro cytotoxicity of splenocytes. Furthermore, T-cell subsets and multiple cytokines (interleukin [IL]-4, -10, and-12; interferon [IFN]-γ; tumor necrosis factor [TNF]-α) in the blood were assessed to elucidate the underlying mechanisms. RESULTS Higher ratios of CD4+ and CD8+ T cells and higher levels of IL-12, IFN-γ, and TNF-α were found in the blood of the mice that received CpG-ODN therapy 12 h after DC injection. The cytotoxicity potency of the splenocytes of these mice was significantly higher compared with the mice in other groups. Moreover, the mice receiving CpG-ODN therapy 12 h after DC injection showed significantly better resistance to rechallenge. Compared with the mice in other groups, the mice receiving CpG-ODN therapy 12 h after DC injection were superior in survival rates and antimetastatic effects. CONCLUSIONS Our study suggested that the therapeutic efficacy was closely associated with CpG-ODN administration in the combined therapeutic protocol of cryoablation, DCs, and immune adjuvant. In situ

  16. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  17. A protocol for amide bond formation with electron deficient amines and sterically hindered substrates

    DEFF Research Database (Denmark)

    Due-Hansen, Maria E; Pandey, Sunil K; Christiansen, Elisabeth; Andersen, Rikke; Hansen, Steffen V F; Ulven, Trond

    2016-01-01

    A protocol for amide coupling by in situ formation of acyl fluorides and reaction with amines at elevated temperature has been developed and found to be efficient for coupling of sterically hindered substrates and electron deficient amines where standard methods failed.......A protocol for amide coupling by in situ formation of acyl fluorides and reaction with amines at elevated temperature has been developed and found to be efficient for coupling of sterically hindered substrates and electron deficient amines where standard methods failed....

  18. Fail-safe computer-based plant protection systems

    International Nuclear Information System (INIS)

    A fail-safe mode of operation for computers used in nuclear reactor protection systems was first evolved in the UK for application to a sodium cooled fast reactor. The fail-safe properties of both the hardware and the software were achieved by permanently connecting test signals to some of the multiplexed inputs. This results in an unambiguous data pattern, each time the inputs are sequentially scanned by the multiplexer. The ''test inputs'' simulate transient excursions beyond defined safe limits. The alternating response of the trip algorithms to the ''out-of-limits'' test signals and the normal plant measurements is recognised by hardwired pattern recognition logic external to the computer system. For more general application to plant protection systems, a ''Test Signal Generator'' (TSG) is used to compute and generate test signals derived from prevailing operational conditions. The TSG, from its knowledge of the sensitivity of the trip algorithm to each of the input variables, generates a ''test disturbance'' which is superimposed upon each variable in turn, to simulate a transient excursion beyond the safe limits. The ''tripped'' status yielded by the trip algorithm when using data from a ''disturbed'' input forms part of a pattern determined by the order in which the disturbances are applied to the multiplexer inputs. The data pattern formed by the interleaved test disturbances is again recognised by logic external to the protection system's computers. This fail-safe mode of operation of computer-based protection systems provides a powerful defence against common-mode failure. It also reduces the importance of software verification in the licensing procedure. (author)

  19. Fuglede's conjecture fails in dimension 4

    OpenAIRE

    Matolcsi, Mate

    2006-01-01

    In this note we give an example of a set $\\W\\subset \\R^4$ such that $L^2(\\W)$ admits an orthonormal basis of exponentials $\\{\\frac{1}{|\\W |^{1/2}}e^{2\\pi i x, \\xi}\\}_{\\xi\\in\\L}$ for some set $\\L\\subset\\R^4$, but which does not tile $\\R^4$ by translations. This improves Tao's recent 5-dimensional example, and shows that one direction of Fuglede's conjecture fails already in dimension 4. Some common properties of translational tiles and spectral sets are also proved.

  20. The Failed Image and the Possessed

    DEFF Research Database (Denmark)

    Suhr, Christian

    2015-01-01

    This article asks if the recurrent queries regarding the value of images in visual anthropology could find new answers by exploring responses to visual media in neo-orthodox Islam. It proposes that the visual display of the photographic image shares a curious resemblance to the bodies of people...... possessed by invisible spirits called jinn. The image as a failed example or model of reality works like the possessed body as an amplifier of invisibility pointing towards that which cannot be seen, depicted visually, or represented in writing. This suggests a negative epistemology in which images obtain...

  1. SPECTRA AND LIGHT CURVES OF FAILED SUPERNOVAE

    International Nuclear Information System (INIS)

    Astronomers have proposed a number of mechanisms to produce supernova explosions. Although many of these mechanisms are now not considered primary engines behind supernovae (SNe), they do produce transients that will be observed by upcoming ground-based surveys and NASA satellites. Here, we present the first radiation-hydrodynamics calculations of the spectra and light curves from three of these 'failed' SNe: SNe with considerable fallback, accretion-induced collapse of white dwarfs, and energetic helium flashes (also known as type Ia SNe).

  2. Tendencies in the development of utilization protocols, seminar report

    Science.gov (United States)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  3. The effect of local cryotherapy on subjective and objective recovery characteristics following an exhaustive jump protocol.

    Science.gov (United States)

    Hohenauer, Erich; Clarys, Peter; Baeyens, Jean-Pierre; Clijsen, Ron

    2016-01-01

    The purpose of this controlled trial was to investigate the effects of a single local cryotherapy session on the recovery characteristics over a period of 72 hours. Twenty-two young and healthy female (n=17; mean age: 21.9±1.1 years) and male (n=5;mean age: 25.4±2.8 years) adults participated in this study. Following an exhaustive jump protocol (3×30 countermovement jumps), half of the participants received either a single local cryotherapy application (+8°C) or a single local thermoneutral application (+32°C) of 20-minute duration using two thigh cuffs. Subjective measures of recovery (delayed-onset muscle soreness and ratings of perceived exertion) and objective measures of recovery (vertical jump performance and peak power output) were assessed immediately following the postexercise applications (0 hours) and at 24 hours, 48 hours, and 72 hours after the jump protocol. Local cryotherapy failed to significantly affect any subjective recovery variable during the 72-hour recovery period (P>0.05). After 72 hours, the ratings of perceived exertion were significantly lower in the thermoneutral group compared to that in the cryotherapy group (P=0.002). No significant differences were observed between the cryotherapy and the thermoneutral groups with respect to any of the objective recovery variables. In this experimental study, a 20-minute cryotherapy cuff application failed to demonstrate a positive effect on any objective measures of recovery. The effects of local thermoneutral application on subjective recovery characteristics were superior when compared to the effects of local cryotherapy application at 72 hours postapplication. PMID:27579000

  4. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides a...... certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation. In this...... paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  5. The Text of the Agreement of 5 April 1973 between The Netherlands and the Agency for the Application of Safeguards with Respect to The Netherlands Antilles in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons and Additional Protocol 1 to the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    The text of the Agreement of 5 April 1973, and of the two Protocols thereto, between The Netherlands and the Agency for the application of safeguards with respect to The Netherlands Antilles in connection with the Treaty on the Non-Proliferation of Nuclear Weapons and with Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Agreement and the two Protocols thereto entered into force on 5 June 1975, pursuant to Article 24 of the Agreement and to Article II of each of the Protocols.

  6. The Text of the Agreement of 5 April 1973 between The Netherlands and the Agency for the Application of Safeguards with respect to Surinam in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons and Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    The text of the Agreement of 5 April 1973, and of the two Protocols thereto, between The Netherlands and the Agency for the application of safeguards with respect to Surinam in connection with the Treaty on the Non-Proliferation of Nuclear Weapons and with Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members.The Agreement and the two Protocols thereto entered into force on 5 June 1975, pursuant to Article 24 of the Agreement and to Article II of each of the Protocols.

  7. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  8. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standa...... financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  9. How to help a failing student

    Directory of Open Access Journals (Sweden)

    Malinić Dušica

    2007-01-01

    Full Text Available Different aspects of family and school life, as well as individual characteristics of the student are related to academic failure in various degrees. Once it has become evident that a student is failing in study and learning, and the causes of the failure have been identified, the question arises of how to help him/her to overcome the existing difficulties. Although there are some authors who hold that the intervention in the domain of failure is inconsistent an unconvincing for a number of reasons, in this paper we shall suggest some solutions and recommendations which have been empirically tested. The first part of the paper discusses the advantages and drawbacks of grouping students according to their abilities as one of the strategies of helping unsuccessful students. In the second part we offer some recommendations for work with unsuccessful students based on their preferred learning styles. The third part focuses on examining the effects of counseling on solving the problem of academic failure. Finally, some general suggestions are offered to students, teachers and parents which might prove useful in enhancing academic attainment of failing students.

  10. Precise Energy Modeling for the Bluetooth Low Energy Protocol

    OpenAIRE

    Kindt, Philipp; Yunge, Daniel; Diemer, Robert; Chakraborty, Samarjit

    2014-01-01

    Bluetooth Low Energy (BLE) is a wireless protocol well suited for ultra-low-power sensors running on small batteries. BLE is described as a new protocol in the official Bluetooth 4.0 specification. To design energy-efficient devices, the protocol provides a number of parameters that need to be optimized within an energy, latency and throughput design space. To minimize power consumption, the protocol parameters have to be optimized for a given application. Therefore, an energy-model that can ...

  11. Model Checking of E-Commerce Protocol using Casper FDR

    OpenAIRE

    Dantuluri Sravanthi

    2013-01-01

    In present days the popularity of electronic commerce applications are motivated the development of new e-commerce protocols. By using these new protocols the secrecy and agreement properties are achieved. This paper mainly focuses on how to model the e-commerce protocol in CSP using SPL and verified using CasperFDR whether the protocol satisfies the properties specified. Attacks are identified in this version. The specifications through which these attacks are found are presented.

  12. Research on Diameter Protocols%Diameter协议研究

    Institute of Scientific and Technical Information of China (English)

    邱锡鹏; 刘海鹏

    2003-01-01

    Diameter is the next authentication,authorization and accounting protocol currently developed in the IETF AAA working group ,which will replace the widely and successfully deployed Radius protocol. In the paper ,the motivations and backgrounds of Diameter protocols are firstly introduced. The following is a detailed description of the Diameter base protocol and its applications,such as mobile IP,NASREQ. Then the comparisons and analysis between Diameter and Radius are given.

  13. Block Advertisement Protocol

    OpenAIRE

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  14. "Counterfactual" quantum protocols

    OpenAIRE

    Vaidman, Lev

    2016-01-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of `counterfactuality' is offered and it is argued that an interaction-free measurement of the presence of an opaque object can be named `counterfactual', while proposed "counterfactual" measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols...

  15. 椭圆曲线离散对数问题上的Fail-stop数字签名方案%Fail-stop digital signatures on elliptic curve discrete logarithm problem.

    Institute of Scientific and Technical Information of China (English)

    李云超; 辛小龙

    2011-01-01

    A new Fail-stop signature program based on elliptic curve discrete logarithm problem is proposed. It can protect the security of the signer. The new protocol presents a one-time signature scheme.A multiple messages signature scheme is given. Both the two schemes have the property of Fail-stop.%提出了一种基于椭圆曲线离散对数问题的Fail-stop签案,保证了签名者的安全性.提出了一次性签名方案,给出了多重消息签名方案,并且这两种方案都具有Fail-stop的性质.

  16. Total body irradiation for bone marrow graft. Results of a national survey on protocols and conditions of their application. Part I: medical and logistic aspects

    International Nuclear Information System (INIS)

    A survey conducted during 1986 evaluated medical and logistic aspects of total body irradiation for bone marrow graft, with particular analysis of type of protocol and functional consequences. Current tendencies were determined by comparison of findings with those of a survey conducted within the framework of the GEGMO in 1984

  17. Model protocol additional to the agreement(s) between state(s) and the International Atomic Energy Agency for the application of safeguards

    International Nuclear Information System (INIS)

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguard system as a contribution to global nuclear non-proliferation objectives

  18. Model Protocol Additional to the Agreement(s) between State(s) and the International Atomic Energy Agency for the application of safeguards

    International Nuclear Information System (INIS)

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguards system as a contribution to global nuclear non-proliferation objectives

  19. Pulsed Nd:YAG laser treatment for failing dental implants due to peri-implantitis

    Science.gov (United States)

    Nicholson, Dawn; Blodgett, Kris; Braga, Charles; Finkbeiner, Larry; Fourrier, Jeanne; George, John; Gregg, Robert; Honigman, Allen; Houser, Bruce; Lamas, William; Lehrman, Neal; Linden, Eric; McCarthy, Delwin; McCawley, Tom; McCormick, Randy; Marcus, Ed; Noraian, Kirk; Rubelman, Peter; Salama, Maurice; Saunders, Steven; Seamons, Brandon; Thein, David; Toms, Michael; Vassos, George; Harris, David M.

    2014-02-01

    A large percentage of dental implants experience complications, most commonly, infection leading to peri-implantitis and peri-mucositis, inflammatory disease involving pathogen contamination. It presents with radiographic findings of crestal bone loss. At this time there appears to be no compelling evidence for an effective intervention. The LANAP protocol is a FDA cleared surgical protocol that produces new attachment and bone regeneration when applied to periodontally infected natural teeth. The LANAP protocol and laser dosimetry have been modified to treat ailing and failing implants. Twenty-one clinicians who have been trained to perform the LANAP protocol and the LAPIPTM protocol have volunteered 26 LAPIP case reports. The time from implant to intervention ranges from 3 months to 16 years. Post-LAPIP radiographs range from 2-48 months. Ten cases were excluded for technical reasons. All 16 remaining cases provide radiographic evidence of increase in crestal bone mass around the implant and, when reported, probe depth reductions. All treating clinicians report control of the infection, reversal of bone loss and rescue of the incumbent implant. Although the success/failure rate cannot be judged from these data, any successes in this area deserve reporting and further study.

  20. Systems with randomly failing repairable components

    DEFF Research Database (Denmark)

    Der Kiureghian, Armen; Ditlevsen, Ove Dalager; Song, Junho

    2005-01-01

    Closed-form expressions are derived for the steady-state availability, mean rate of failure, mean duration of downtime and reliability of a general system with randomly and independently failing repairable components. Component failures are assumed to be homogeneous Poisson events in time and...... system performance measures with respect to the mean rate of failure and the mean duration of repair of each component. These expressions provide a convenient framework for identifying important components within the system and for decisionmaking aimed at upgrading the system availability or reliability...... repair durations are assumed to be exponentially distributed. The results are expressed in terms of the mean rates of failure and mean durations of repair of the individual components. These expressions also allow derivation of closedform expressions for the rates of change of the various probabilistic...

  1. Commemoration of Montreal Protocol

    OpenAIRE

    CUCULEANU Georgeta

    2008-01-01

    The paper presents the main provisions of the Convention from Vienna for the Protection of the Ozone Layer, the 1987 Montreal Protocol on Substances that deplete the Ozone Layer and its Amendments. The restricting and banning programmes of these substances, some consequences on the environment of the absence of the Protocol and some alternative substances are also presented.

  2. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two...

  3. Study on multi protocol label switching (MPLS) technology and its application%多协议标记交换技术的原理及应用

    Institute of Scientific and Technical Information of China (English)

    程建兴; 陈红斌; 赖友源; 黄宏波

    2005-01-01

    网络互联协议(Internet-protocol,IP)和异步传输模式(Asynchronous Transfer Mode,ATM)技术的结合,能充分发挥多协议标记交换(Multi Protocol Label Switching,MPLS)技术在流量管理方面的作用.MPLS在帧中继和ATM上运行,为面向连接的技术带来了IP的任意连通,适合在骨干网与广域网中使用.文章简述了MPLS的基本原理及其典型的网络体系结构,着重讨论了MPLS的应用.

  4. A Primary-Backup Protocol for In-Memory Database Replication

    OpenAIRE

    Camargos, Lásaro; Pedone, Fernando; Schmidt, Rodrigo

    2006-01-01

    The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control and deferred disk writes. Primary crashes are quickly detected by backups and a new primary is elected whenever the current one is suspected to have failed. False failure suspicions are tolerated and never lead to incorrect behavior. The protocol uses a consensus-like algorithm tailor-made for our replication enviro...

  5. Android平台可增量同步的网络应用协议%Incremental Synchronizable Network Application Protocol on Android Platform

    Institute of Scientific and Technical Information of China (English)

    刘宇; 戴鸿君; 郭凤华; 赵国玲

    2011-01-01

    In order to solve data synchronization interruption caused by instability of mobile communication network, this paper uses Extensible Markup Language(XML) to design incremental synchronizable network protocol, and tags-bit to record incremental synchronization information. The protocol achieves the incremental synchronization process by coordinating of database and file system to improve the system performance and security. The incremental file transfer technology used in the protocol can improve the efficiency of data synchronization. The network protocol is applied to a dormitory management system on mobile phone with Android. Experimental results show that the system supports transmission interrupt and the reliability of the data synchronization is improved.%针对移动通信网络不稳定所造成的数据同步中断问题,使用可扩展标记语言设计一种可增量同步的网络应用协议,采用标记位方式记录同步执行情况,通过数据库、文件系统的相互配合实现增量同步,以提高系统性能及安全性,并利用增量文件传输技术提高数据同步效率.将该协议用于Android手机宿舍管理系统,结果表明,系统支持传输中断,数据同步的可靠性明显提高.

  6. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  7. Development Of Protocols For Simultaneous Measurements Of Rn, Tn Using Nuclear Track Detectors And Trial Application In Mining Areas Of Vietnam

    International Nuclear Information System (INIS)

    Radioactive gases Radon (Rn) and Thoron (Tn) contribute of more than 50% of natural radiation dose. However, separate measurements of Rn and Tn have not been paid enough attention. An Intergovernmental Cooperation Project was conducted at the Institute for Nuclear Science and Technology with the help from Hungarian experts. The main tasks of the project were to finalize 02 protocols for simultaneous measurements of Rn and Tn using nuclear track detectors and to test these protocols in investigating the concentrations of Rn and Tn, calculating the natural dose due to Rn and Tn, and evaluating the increased radiation dose and radiation safety due to mining activities. Main results of the project include 02 protocols for simultaneous measurements of Rn and Tn and the test results in the mining areas. Rn and Tn concentrations inside the coal mining tunnels are in the average level of Vietnam and the world. Tn concentration inside the factory for separating Zircon at the Ha Tinh Zircon Processing Plant was found to be very high, up to 2931 Bq/m3. Based on annual effective dose calculation, workers inside the factory for separating Zircon at the Ha Tinh Zircon Processing Plant could receive an annual effective dose due to Rn and Tn of 4.890 mSv/year, and the increasing dose of 4.710 mSv/year is for higher than 1 mSv/year recommended by the IAEA. (author)

  8. 78 FR 4349 - Records of Failed Insured Depository Institutions

    Science.gov (United States)

    2013-01-22

    ... CORPORATION 12 CFR Part 360 RIN 3064-AD99 Records of Failed Insured Depository Institutions AGENCY: Federal... retention of records of a failed insured depository institution. The proposed rule incorporates the.... Background When acting as receiver of a failed insured depository institution, the FDIC succeeds to the...

  9. A review of the Protocol Reporter v.2.0

    International Nuclear Information System (INIS)

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on November 14th, 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on June 21st, 1999 and entered into force on February 19th, 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports have been submitted through Protocol Reporter provided by IAEA. Protocol Reporter is a computer system that facilitates preparation of reports by Member States of Declarations pursuant to Article 2 and 3 of the Protocol Additional to Safeguards Agreements (Additional Protocol). Protocol Reporter version 1.0 was developed by the IAEA in 1999 to help Member States structure electronic data storage and reporting formats in a way which is compatible with the guidelines on the Additional Protocol and its data handling system. However, Protocol Reporter version 1.0 had several limitations in data management and Member states requested upgraded software. In order to meet the demand, IAEA developed and released Protocol Reporter version 2.0 in 2008. Member states, consequently, should declare and submit the additional reports through the new version of the protocol reporter. This paper aimed to provide a brief overview of Protocol Reporter v.2.0 and highlight the improvements over the previous version

  10. Protocol to suspend the application of safeguards pursuant to the Agreement of 26 February 1976 between the Agency, the Government of the Federative Republic of Brazil and the Government of the Federal Republic of Germany in the light of the provisions for the application of safeguards pursuant to the Quadripartite Safeguards Agreement between Argentina, Brazil, the Brazilian-Argentine Agency for the Accounting and Control of Nuclear Materials and the IAEA

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol of 16 October 1998 suspending the application of safeguards under the Safeguards Agreement (INFCIRC/237) of 26 February 1976 between the Agency, Brazil and the Federal Republic of Germany in the light of the provisions for the application of safeguards pursuant to the Quadripartite Safeguards Agreement between the Agency, Brazil, the Brazilian-Argentine Agency for the Accounting and Control of Nuclear Materials and the IAEA. The Protocol entered into force on 21 October 1999

  11. The British Model in Britain: Failing slowly

    International Nuclear Information System (INIS)

    In 1990, Britain reorganised its electricity industry to run on competitive lines. The British reforms are widely regarded as successful and the model used provides the basis for reforms of electricity industries worldwide. The main reason for this perception of success is major reductions in the real price of electricity with no reduction in service quality. This paper examines whether the reputation of the British reforms is justified. It concludes that the reputation is not justified and that serious fundamental problems are beginning to emerge. The central question is: have the British reforms resulted in the creation of efficient wholesale and retail markets? On this criterion, the reforms have failed. The wholesale market is dominated by obscure long-term contracts, privileged access to the market and self-dealing within integrated generator/retailers, leaving the spot markets with minimal liquidity and unreliable prices. The failure to develop an efficient wholesale market places the onus on consumers to impose competitive forces on electricity companies by switching regularly. Small consumers will not do this and they are paying too much for their power. For the future, there is a serious risk that the electricity industry will become a weakly regulated oligopoly with a veneer of competition. (author)

  12. Capital disadvantage: America's failing capital investment system.

    Science.gov (United States)

    Porter, M E

    1992-01-01

    The U.S. system of allocating investment capital is failing, putting American companies at a serious disadvantage and threatening the long-term growth of the nation's economy. The problem, says Michael Porter, goes beyond the usual formulation of the issue: accusations of "short-termism" by U.S. managers, ineffective corporate governance by directors, or a high cost of capital. The problem involves the external capital allocation system by which capital is provided to companies, as well as the system by which companies allocate capital internally. America's system is marked by fluid capital and a financial focus. Other countries--notably Japan and Germany--have systems with dedicated capital and a focus on corporate position. In global competition, where investment increasingly determines a company's capacity to upgrade and innovate, the U.S. system does not measure up. These conclusions come out of a two-year research project sponsored by the Harvard Business School and the Council on Competitiveness. Porter recommends five far-reaching reforms to make the U.S. system superior to Japan's and Germany's: 1. Improve the present macroeconomic environment. 2. Expand true ownership throughout the system so that directors, managers, employees, and even customers and suppliers hold positions as owners. 3. Align the goals of capital providers, corporations, directors, managers, employees, customers, suppliers, and society. 4. Improve the information used in decision making. 5. Foster more productive modes of interaction and influence among capital providers, corporations, and business units. PMID:10121317

  13. The British Model in Britain: Failing slowly

    International Nuclear Information System (INIS)

    In 1990, Britain reorganised its electricity industry to run on competitive lines. The British reforms are widely regarded as successful and the model used provides the basis for reforms of electricity industries worldwide. The main reason for this perception of success is major reductions in the real price of electricity with no reduction in service quality. This paper examines whether the reputation of the British reforms is justified. It concludes that the reputation is not justified and that serious fundamental problems are beginning to emerge. The central question is: have the British reforms resulted in the creation of efficient wholesale and retail markets? On this criterion, the reforms have failed. The wholesale market is dominated by obscure long-term contracts, privileged access to the market and self-dealing within integrated generator/retailers, leaving the spot markets with minimal liquidity and unreliable prices. The failure to develop an efficient wholesale market places the onus on consumers to impose competitive forces on electricity companies by switching regularly. Small consumers will not do this and they are paying too much for their power. For the future, there is a serious risk that the electricity industry will become a weakly regulated oligopoly with a veneer of competition

  14. The British Model in Britain: Failing slowly

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Steve [Public Service International Research Unit, Business School, University of Greenwich, 30 Park Row, London SE10 9LS (United Kingdom)

    2006-03-15

    In 1990, Britain reorganised its electricity industry to run on competitive lines. The British reforms are widely regarded as successful and the model used provides the basis for reforms of electricity industries worldwide. The main reason for this perception of success is major reductions in the real price of electricity with no reduction in service quality. This paper examines whether the reputation of the British reforms is justified. It concludes that the reputation is not justified and that serious fundamental problems are beginning to emerge. The central question is: have the British reforms resulted in the creation of efficient wholesale and retail markets? On this criterion, the reforms have failed. The wholesale market is dominated by obscure long-term contracts, privileged access to the market and self-dealing within integrated generator/retailers, leaving the spot markets with minimal liquidity and unreliable prices. The failure to develop an efficient wholesale market places the onus on consumers to impose competitive forces on electricity companies by switching regularly. Small consumers will not do this and they are paying too much for their power. For the future, there is a serious risk that the electricity industry will become a weakly regulated oligopoly with a veneer of competition. (author)

  15. The Born rule fails in cosmology

    International Nuclear Information System (INIS)

    The Born rule may be stated mathematically as the rule that probabilities in quantum theory are expectation values of a complete orthogonal set of projection operators. This rule works for single laboratory settings in which the observer can distinguish all the different possible outcomes corresponding to the projection operators. However, theories of inflation suggest that the universe may be so large that any laboratory, no matter how precisely it is defined by its internal state, may exist in a large number of very distantly separated copies throughout the vast universe. In this case, no observer within the universe can distinguish all possible outcomes for all copies of the laboratory. Then normalized probabilities for the local outcomes that can be locally distinguished cannot be given by the expectation values of any projection operators. Thus the Born rule fails and must be replaced by another rule for observational probabilities in cosmology. The freedom of what this new rule is to be is the measure problem in cosmology. A particular volume-averaged form is proposed

  16. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  17. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  18. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification....... In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  19. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    OpenAIRE

    Mödersheim, Sebastian Alexander; Viganò, Luca

    2014-01-01

    Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protoco...

  20. A Performance Comparison of Two Real Time WLAN MAC Protocols

    Institute of Scientific and Technical Information of China (English)

    CAO Chun-sheng; LI Feng; ZHANG Wei-dong

    2007-01-01

    By modifying the IEEE 802.11 wireless local area network (WLAN) medium access protocol (MAC), a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications. Both protocols can ensure the real time frame only need to wait a determinable bounded time. These two protocols are introduced briefly and a performance comparison between them is made. Simulation results show that each protocol has advantage over the others in certain network condition.

  1. A Review of Fair Exchange Protocols

    Directory of Open Access Journals (Sweden)

    Abdullah AlOtaibi

    2012-08-01

    Full Text Available Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we review these protocols in detail. In addition, we present a survey of three fair exchange protocols based on online TTP from different application areas. In particular, we review these protocols with regard to certain properties, namely, fairness, correctness of product, customer's anonymity, timeliness and channel requirement.

  2. A case study for demonstrating the application of U.S. EPA's monitored natural attenuation screening protocol at a hazardous waste site

    Science.gov (United States)

    Clement, T. Prabhakar; Truex, Michael J.; Lee, Peter

    2002-11-01

    Natural attenuation assessment data, collected at a Superfund site located in Louisiana, USA, are presented. The study site is contaminated with large quantities of DNAPL waste products. Source characterization data indicated that chlorinated ethene and ethane compounds are the major contaminants of concern. This case study illustrates the steps involved in implementing the U.S. EPA's [U.S. EPA, 1998. Technical protocol for evaluating natural attenuation of chlorinated solvents in ground water, by Wiedmeier, T.H., Swnason, M.A., Moutoux, D.E., Gordon, E.K., Wilson, J.T., Wilson, B.H., Kampbell, D.H., Hass, P.E., Miller, R.N., Hansen, J. E., Chapelle, F.H., Office of Research and Development, EPA/600/R-98/128] monitored natural attenuation (MNA) screening protocol at this chlorinated solvent site. In the first stage of the MNA assessment process, the field data collected from four monitoring wells located in different parts of the plume were used to complete a biodegradation scoring analysis recommended by the protocol. The analysis indicates that the site has the potential for natural attenuation. In the second stage, a detailed conceptual model was developed to identify various contaminant transport pathways and exposure points. The U.S. EPA model and BIOCHLOR was used to assess whether the contaminants are attenuating at a reasonable rate along these transport paths so that MNA can be considered as a feasible remedial option for the site. The site data along with the modeling results indicate that the chlorinated ethene and chlorinated ethane plumes are degrading and will attenuate within 1000 ft down gradient from the source, well before reaching the identified exposure point. Therefore, MNA can be considered as one of the feasible remediation options for the site.

  3. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  4. Application of industrial hygiene techniques for work-place exposure assessment protocols related to petro-chemical exploration and production field activities

    International Nuclear Information System (INIS)

    Standard industrial hygiene techniques for recognition, evaluation, and control can be directly applied to development of technical protocols for workplace exposure assessment activities for a variety of field site locations. Categories of occupational hazards include chemical and physical agents. Examples of these types of hazards directly related to oil and gas exploration and production workplaces include hydrocarbons, benzene, oil mist, hydrogen sulfide, Naturally Occurring Radioactive Materials (NORM), asbestos-containing materials, and noise. Specific components of well process chemicals include potential hazardous chemical substances such as methanol, acrolein, chlorine dioxide, and hydrochloric acid. Other types of exposure hazards may result from non-routine conduct of sandblasting and painting operations

  5. Experience of the application of the 'Spanish Protocol' for the radiological surveillance and control of scrap and the metallic products resulting from its processing

    International Nuclear Information System (INIS)

    Despite the fact that the use of radiation technologies has been subject to strict controls in most countries since the very beginning, the presence of radioactive materials in scrap has been detected relatively often in recent years. This has led to the implementation of a series of national and international initiatives aimed at detecting and preventing such events, regardless of whether they are intentional or unintentional. The Spanish iron and steel industry is one of the most important industrial sectors in the country, and depends to a large extent on the importing of a significant proportion of the scrap used as raw material. Experience has shown that countries that import large quantities of scrap should complement the aforementioned international initiatives with others of national scope, in order to reduce the risks arising from the presence of radioactive material in such material. In this context, in 1999 the Spanish authorities, along with the business associations involved in the metal recovery and smelting industry and the radioactive waste management agency, voluntarily signed a 'Protocol' defining and implementing a national system for the radiological surveillance and control of scrap and products resulting from its processing. Since then the most relevant Trade Unions and others in the industrial sector have also signed the 'Protocol'. The system defines the rights and obligations of the Parties and describes the surveillance and control system to be established, which consists of a set of legal bases, the operation of specific radiological surveillance equipment - either new and specific or general purpose equipment already in existence prior to these initiatives - the development of radiological training and information plans for the professionals involved in the metal recovery and smelting sectors, the definition of a fully operational system to safely manage the materials detected and general improvement of the national radiological

  6. Application of Modbus protocol in the detection system of broken pipes%Modbus协议在破管检测系统中的应用

    Institute of Scientific and Technical Information of China (English)

    陈俊; 王勇

    2014-01-01

    The broken pipe detection system adopts a PIC24F microcontroller(PIC24FJ64GA006) of the Microchip Technology Inc. as the main controller chip. In order to realize communication between the system and the Personal Computer, Modbus communication protocol is used on the basis of RS485 serial port. The implementation and design process of the Modbus communication protocol in the broken pipe detection system are analyzed, and the main flow chart of the software is given. The reading and writing register procedure of Modbus RTU(Remote Terminal Unit) communication protocol is explained, and the Modbus RTU protocol is simplified according to the actual situation so as to effectively improve data transmission and the efficiency of the code. The experimental result shows that the scheme can improve the stability and safety in the process of data transfer.%本破管检测系统采用美国微芯科技公司的 PIC24F单片机(PIC24FJ64GA006)为主控制器芯片。为了实现 PIC24F 和上位机的通信,在 RS485串行通信总线接口基础上,应用了 Modbus通信协议。文中分析了 Modbus协议在破管检测系统中的实现和设计过程,给出了软件的主要功能流程图,阐述了 Modbus RTU(远程终端单元)通信协议读写寄存器过程,并结合实际对 Modbus RTU协议进行相应的裁剪,以有效实现有效数据传输,提高代码运行的效率。实验验证:本协议的实现方案能提高数据传输的稳定性和安全性,已成功运用到破管检测系统中。

  7. The role of central, regional and local administrations in the application of the Kyoto protocol in the forestry sector in Italy

    Directory of Open Access Journals (Sweden)

    Pompei E

    2007-01-01

    Full Text Available According to art. 3.3 and 3.4 of the Kyoto Protocol and subsequent UNFCCC COP's and national decisions, Italy shall report the net changes in GHG emissions by sources and removals by sinks resulting from afforestation, reforestation and deforestation (art. 3.3 and forest management (art. 3.4 activities. To assess art. 3.3 activities, Italy will define methods to estimate land use changes occurring after 31 December 1989. The paper considers the key-role that central administration shall have, as well as the role of regional and local administrations in order to solve some specific topics regarding data collection and management issues.

  8. Village Level Protocol

    OpenAIRE

    Ankur Dumka

    2014-01-01

    Here in this paper we have proposed for a protocol to be implemented at the village level. As at the village level as there are few agencies to be contacted at village level so this uses a local label addressing of 4 bits to support 16 agencies with 3 bits Time to live header which checks weather a packet is reached or not. Thus being small packet size this protocol is faster and able to support fast network service at village level.

  9. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  10. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  11. Cryptanalysis of Two RFID Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Tianjie Cao

    2009-07-01

    Full Text Available Radio frequency identi¯cation (RFID technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protocol cannot resist replay attacks, and therefore an adversary can impersonate a legal tag. Next, we present a full-disclosure attack on the CWH protocol. By sending malicious queries to a tag and collecting the response messages emitted by the tag, the full-disclosure attack allows an adversary to extract the secret information from the tag.

  12. Application of European protocol in the evaluation of contrast-to-noise ratio and mean glandular dose for two digital mammography systems

    International Nuclear Information System (INIS)

    The performance of two digital mammography systems, Agfa CR75 and CRMM3 computed radiography (CR) and IMS Giotto MD direct digital radiography (DR), was assessed by applying a method recommended in the European protocol for quality control in mammography screening. The contrast-to-noise ratio (CNR) and mean glandular dose (MGD) values were measured and contrast detail (CD) analysis was performed. The CNRs for system CR were 21.9, 12.9, 9.5, 8.8, 7.4, 5.5 and 4.4 for 2, 3, 4, 4.5, 5, 6 and 7-cm polymethylmethacrylate (PMMA) thickness, respectively. The respective CNRs for system DR were 10.4, 8.8, 6.3, 7.3, 7.2, 6.4 and 6.54. For the same phantom thickness sequence, the MGDs were 0.7, 1.1, 1.3, 1.6, 1.9, 2.5 and 3.4 mGy for system CR, whereas they were 0.7, 1.2, 1.1, 1.3, 1.8, 3.5 and 3.9 mGy for system DR. The CNR and MGD results satisfactorily correlate with CD analysis results. The MGD values compare well with the values recommended in the European protocol. Despite being simple, CNR and MGD can provide an effective system for performance assessment and constancy checks for related optimisations. (authors)

  13. A methodology for analysing temporal changes of forest surface using aerial photos for the application of Kyoto protocol: a study case in Northern Italy

    Directory of Open Access Journals (Sweden)

    Salvadori I

    2006-01-01

    Full Text Available According to art. 3.3 of the Kyoto Protocol, Italy, like other Parties included in Annex I, shall report the net changes in greenhouse gas emissions by sources and removals by sinks resulting from afforestation, reforestation and deforestation activities (ARD. To evaluate these activities, Italy has to elaborate methods to estimate the conversion of non-forested to forested land, occurred after 31 December 1989. The aim of this study was to test a methodology to estimate the ARD activities. The approach was experimented in the Comunità Montana del Grappa (about 10500 ha considered as a pilot area in the Prealpine region (NE Italy. The land-use change relative to the forest area was assessed by multitemporal classification of 1131 sampling points on orthocorrected aerial photos relative to 1991, 1996 and 1999. The forest area based on different definitions (minimum land cover equal to 10%, 20% or 30% and minimum surface equal to 2000 m2 or 5000 m2 was also assessed. Between 1991 and 1999, the total increment of the forest area was equal to 224 ha. However, the estimated increment was strongly related to the minimum surface (2000 m2 vs 5000 m2 of the forest definition. The proposed procedure was relatively easy to implement and highlighted the role of ARD and revegetation to attain the goals appointed from the Kyoto Protocol.

  14. Research of Application Layer Protocol in Electric Vehicle Based on CAN Bus%应用于电动汽车的CAN网络应用层协议研究

    Institute of Scientific and Technical Information of China (English)

    袁传义; 吴志新; 刘成晔; 黄学勤

    2012-01-01

    介绍了CAN技术规范和OSI参考模型;从通信内容的确定、标识符分配、消息编码方式、消息调度策略、数据格式定义5个方面考虑,制定了一套适用于电动汽车的CAN网络应用层协议.实际应用表明,采用该协议的CAN总线通信系统有很高的可靠性,通信负载率不超过30%,保证了紧急报文的及时发现和处理.%The CAN technical specifications and OS1 reference model were introduced, and an application layer protocol of CAN network was established for electric vehicle considering five aspects including determination of communication contents, identifier assignment, message encoding, message scheduling strategies and data format define. Practical application result showed that CAN bus communication system adopting the protocol has high reliability and the communication load rate is less than 30%, which ensures timely detection and treatment of emergency messages.

  15. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  16. A Secure Protocol for Efficient SMS Transmission and Management

    Directory of Open Access Journals (Sweden)

    Lianju Ning

    2013-09-01

    Full Text Available Recently, the usage of mobile phones around the world is growing more and more. Short Message Service (SMS is one of the most important applications due to its easy way to send and receive messages from users to users. There have been many transmission protocols aiming to make sure secure and effective transferring in the SMS. Some of them are based on symmetric algorithms, while others are based on signature encryption or public key infrastructure. However, all of these existing protocols lack sufficient security or high efficiency. When the protocols possess high security margin, they usually have a limited performance in software. And when the performance is guaranteed, the security margin usually decreases. So in this paper, we study the advantages and disadvantages of some widely-used protocols. Basing on this, we propose a new protocol for secure SMS transmission. Our protocol improves both the structure and the modules of previous protocols from theoretical and practical aspects, so that it can assure the security level as well as very efficient performance. Compared with other protocols having similar security, our protocol has a more convenient implementation. Compared with other protocols with similar performance, our protocol is safer. Also, we use a signature model which does not need the PKI on-line, increasing the security greatly. Finally, we take experiments on real mobile phones to verify our protocol and analyze the results.

  17. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Directory of Open Access Journals (Sweden)

    Md. Golam Rashed

    2014-06-01

    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  18. Sediments fail to record geomagnetic transitions

    Science.gov (United States)

    Valet, Jean-Pierre; Meynadier, Laure; Bassinot, Franck; Simon, Quentin; Thouveny, Nicolas

    2016-04-01

    We have studied four records of the last Matuyama-Brunhes reversal from sediment cores from the equatorial Indian Ocean, west equatorial Pacific Ocean and North Atlantic Ocean with deposition rates of 4cm/ka and 2cm/ka for one equatorial core. All measurements were performed using 8cc cubic samples. In three records the demagnetization diagrams of the transitional samples are of bad quality. In the best samples the characteristic component of magnetization is defined with a large error that is reflected by an increase of the MAD value by at least a factor 10 with respect to non-transitional samples. Although not being frequently reported in papers which tend to exhibit the best demagnetization diagrams, this behavior is actually typical of most transitions studied in sedimentary sequences and somehow questions the reliability of the records. It is frequently considered that failure to isolate the initial magnetization component is due to weakly magnetized transitional samples with magnetization about ten times lower than outside the reversal. However, the magnetization intensity of transitional samples is much stronger in two of the present cores than the non-transitional samples of the other cores. The VGP paths that were tentatively derived from these transitions are quite complex and very different from each other. After rescaling all results to the same resolution the length of the transitional intervals remains different between each core suggesting that different magnetization processes were at work and yielded different records of the rapid field changes during the transition. Because similar magnetic grains recorded different directions, demagnetization fails to isolate a characteristic component. The sediment from west equatorial Pacific is an interesting exception with nice univectorial transitional diagrams decreasing towards the origin. The inclination remains close to zero, while the declination rotates smoothly between the two polarities. As a

  19. Lightweight Distance bound Protocol for Low Cost RFID Tags

    CERN Document Server

    Ahmed, Eslam Gamal; Hashem, Mohamed

    2010-01-01

    Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags. This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol. The implementation of the proposed protocol meets the limited abilities of low-cost RFID tags.

  20. Protocol Additional to the Agreement between the Republic of Guatemala and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin-America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Guatemala and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in Guatemala City on 14 December 2001

  1. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002

  2. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed in Vienna on 20 September 2007

  3. A modified protocol for sex identification of in ovo avian embryos and its application as a management tool for endangered species conservation programs.

    Science.gov (United States)

    Dutton, C J; Tieber, A

    2001-06-01

    A simple, reliable, and safe protocol was developed for the collection of small amounts of blood from avian eggs of variable size and at early stages of development. Fifty eggs were used in the study; 40 were common chicken (Gallus domesticus) eggs, six were homing pigeon (Columba livia domestica) eggs, and four were burrowing owl (Athene cunicularia) eggs. Collection was attempted approximately halfway through incubation. The success rate for collection of blood or blood-tinged fluid from eggs was high, averaging 68% in the chicken eggs, 100% in the homing pigeon eggs, and 75% in the burrowing owl eggs. Collection did not affect subsequent hatchability. This blood could then be used to determine the sex of the embryo by utilizing a DNA probe or restriction fragment length polymorphism technique. Sex identification in ovo allowed the demographic management of small populations of birds within our institution. PMID:12790417

  4. Robust assertions and fail-bounded behavior

    OpenAIRE

    Prata, Paula; Rela, Mario; Madeira, Henrique; Silva, João Gabriel

    2005-01-01

    In this paper the behavior of assertion-based error detection mechanisms is characterized under faults injected according to a quite general fault model. Assertions based on the knowledge of the application can be very effective at detecting corruption of critical data caused by hardware faults. The main drawbacks of that approach are identified as being the lack of protection of data outside the section covered by assertions, namely during input and output, and the po...

  5. Using machine learning to speed up manual image annotation: application to a 3D imaging protocol for measuring single cell gene expression in the developing C. elegans embryo

    Directory of Open Access Journals (Sweden)

    Waterston Robert H

    2010-02-01

    Full Text Available Abstract Background Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tracking the expression of individual C. elegans genes was developed that collects image samples of a developing embryo by 3-D time lapse microscopy. In this protocol, a program called StarryNite performs the automatic recognition of fluorescently labeled cells and traces their lineage. However, due to the amount of noise present in the data and due to the challenges introduced by increasing number of cells in later stages of development, this program is not error free. In the current version, the error correction (i.e., editing is performed manually using a graphical interface tool named AceTree, which is specifically developed for this task. For a single experiment, this manual annotation task takes several hours. Results In this paper, we reduce the time required to correct errors made by StarryNite. We target one of the most frequent error types (movements annotated as divisions and train a support vector machine (SVM classifier to decide whether a division call made by StarryNite is correct or not. We show, via cross-validation experiments on several benchmark data sets, that the SVM successfully identifies this type of error significantly. A new version of StarryNite that includes the trained SVM classifier is available at http://starrynite.sourceforge.net. Conclusions We demonstrate the utility of a machine learning approach to error annotation for StarryNite. In the process, we also provide some general methodologies for developing and validating a classifier with respect to a given pattern recognition task.

  6. Interior's Climate Science Centers: Focus or Fail

    Science.gov (United States)

    Udall, B.

    2012-12-01

    After a whirlwind two years of impressive and critical infrastructure building, the Department of Interior's Climate Science Centers are now in a position to either succeed or fail. The CSCs have a number of difficult structural problems including too many constituencies relative to the available resources, an uneasy relationship among many of the constituencies including the DOI agencies themselves, a need to do science in a new, difficult and non-traditional way, and a short timeframe to produce useful products. The CSCs have built a broad and impressive network of scientists and stakeholders. These entities include science providers of the universities and the USGS, and decision makers from the states, tribes, DOI land managers and other federal agencies and NGOs. Rather than try to support all of these constituencies the CSCs would be better served by refocusing on a core mission of supporting DOI climate related decision making. The CSCs were designed to service the climate science needs of DOI agencies, many of which lost their scientific capabilities in the 1990s due to a well-intentioned but ultimately harmful re-organization at DOI involving the now defunct National Biological Survey. Many of these agencies would like to have their own scientists, have an uneasy relationship with the nominal DOI science provider, the USGS, and don't communicate effectively among themselves. The CSCs must not succumb to pursuing science in either the traditional mode of the USGS or in the traditional mode of the universities, or worse, both of them. These scientific partners will need to be flexible, learn how to collaborate and should expect to see fewer resources. Useful CSC processes and outputs should start with the recommendations of the 2009 NRC Report Informing Decisions in a Changing Climate: (1) begin with users' needs; (2) give priority to process over products; (3) link information producers and users; (4) build connections across disciplines and organizations

  7. Debunking myths of protocol registration

    OpenAIRE

    Chang Stephanie M; Slutsky Jean

    2012-01-01

    Abstract Developing and registering protocols may seem like an added burden to systematic review investigators. This paper discusses benefits of protocol registration and debunks common misperceptions on the barriers of protocol registration. Protocol registration is easy to do, reduces duplication of effort and benefits the review team by preventing later confusion.

  8. Search of problems for improving the failed fuel location system

    International Nuclear Information System (INIS)

    Identification criteria of the failed fuel was reviewed to solve the problems of failed fuel location system in Wolsong Unit-2 reactors. As a result of the review, it was confirmed that the existing discrimination ratio of identifying the failed fuels could not be applied directly to analyze the data acquired from delayed neutron measurement because of the flow rate differences among the sampling lines. Therefore, correction factors to compensate the differences will be employed in analyzing the data

  9. Feasibility study of a fail-safe through bulkhead initiator

    International Nuclear Information System (INIS)

    The design status of a through bulkhead initiator (TBI) is presented. The TBI design consists of a high explosive donor which when detonated transmits a shock wave through a metal bulkhead to initiate an acceptor explosive without destroying the integrity of the bulkhead. There are at least two potential applications for such a device. The combined requirements of the two applications are severe in several aspects, namely: fail-safe, small size, and controlled function time. The PETN donor output was characterized by velocity interferometer techniques. Two methods of controlling the output were demonstrated: (1) controlling the density of the donor and (2) controlling the length of the donor column (in relationship to the bulkhead thickness). The Type 304L stainless steel bulkhead was designed using a combination of experimental and analytical techniques to assure both function and integrity. The Type 304L provides a single shock rather than a multiple wave structure and exhibits high ductility. The PETN selected for the acceptor was chosen on the basis of shock sensitivity testing in which the morphology of the explosive and the wave shape of the stimulus entering the explosive played key roles. When tested with a short pulse (40 ns, rectangular), the small particle size PETN initiated at a lower pressure than did the large particle size PETN; when tested with a long pulse (280 ns, triangular), the large particle size PETN initiated at a lower pressure than did the small particle size PETN

  10. PERFORMANCE ANALYSIS OF TRANSPORT PROTOCOL DURING LIVE MIGRATION OF VIRTUAL MACHINES

    Directory of Open Access Journals (Sweden)

    Prakash H R

    2011-10-01

    Full Text Available The Physical servers used in IT are under-utilized. The better utilization of these servers can be achieved using virtualization technology. Virtualization techniques create multiple partitions whichare isolated with each other called virtual machines. Each virtual machine (guest runs their own operating system. The resource allocated for these VMs may fail to execute an application because ofresource conflict or un availability of resources. This motivates towards live migration of virtual machines. The live migration copies the running VM from source host to destination host seamlesslyusing TCP as transport protocol.This paper evaluates performance of TCP in live migration of KVM based virtual machines. The flexibility in UDP which drives the concentration can also be used for thismigration.

  11. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  12. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  13. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  14. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  15. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  16. Study and Improvement of WTLS Protocol in WAP

    Institute of Scientific and Technical Information of China (English)

    CHEN Kai; LIU Ying; XIAO Guozhen

    2001-01-01

    Wireless application protocol (WAP)is a set of protocol designed for mobile terminal toconnect to Internet and is likely to become world stan-dard. Wireless transport layer security (WTLS) incor-porates the security features in WAP. In this paper,the analysis of the performance of WTLS is made.Two improvement schemes on WTLS are given: oneis that the client stores the certificate of servers; theother is that a new WTLS protocol is proposed basedon the designed authentication scheme.

  17. A Comparative Study of Various Routing Protocols in VANET

    OpenAIRE

    Kumar, Rakesh; Dave, Mayank

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. F inally the paper conclud...

  18. A Comparative Study of Various Routing Protocols in VANET

    OpenAIRE

    Rakesh Kumar; Mayank Dave

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. Finally the paper conclude...

  19. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  20. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    OpenAIRE

    A. Suruliandi; T.SAMPRADEEPRAJ

    2015-01-01

    Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN). They are On Demand Multicast Routing Protocol (ODMRP), Protocol for Unified Multicasting through Announcement (PUMA), Multicast Adhoc On demand Distance Vector Protocol (MAODV), Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP), Application Layer Multi...

  1. Innovative Drugs to Treat Depression: Did Animal Models Fail to Be Predictive or Did Clinical Trials Fail to Detect Effects?

    OpenAIRE

    Belzung, Catherine

    2014-01-01

    Over recent decades, encouraging preclinical evidence using rodent models pointed to innovative pharmacological targets to treat major depressive disorder. However, subsequent clinical trials have failed to show convincing results. Two explanations for these rather disappointing results can be put forward, either animal models of psychiatric disorders have failed to predict the clinical effectiveness of treatments or clinical trials have failed to detect the effects of these new drugs. A care...

  2. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    International Nuclear Information System (INIS)

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m2, and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade ≥3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade ≥3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  3. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    Directory of Open Access Journals (Sweden)

    Campagne Fabien

    2008-02-01

    Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT

  4. Applications and methods utilizing the Simple Semantic Web Architecture and Protocol (SSWAP) for bioinformatics resource discovery and disparate data and service integration

    Science.gov (United States)

    2010-01-01

    Background Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of data between information resources difficult and labor intensive. A recently described semantic web protocol, the Simple Semantic Web Architecture and Protocol (SSWAP; pronounced "swap") offers the ability to describe data and services in a semantically meaningful way. We report how three major information resources (Gramene, SoyBase and the Legume Information System [LIS]) used SSWAP to semantically describe selected data and web services. Methods We selected high-priority Quantitative Trait Locus (QTL), genomic mapping, trait, phenotypic, and sequence data and associated services such as BLAST for publication, data retrieval, and service invocation via semantic web services. Data and services were mapped to concepts and categories as implemented in legacy and de novo community ontologies. We used SSWAP to express these offerings in OWL Web Ontology Language (OWL), Resource Description Framework (RDF) and eXtensible Markup Language (XML) documents, which are appropriate for their semantic discovery and retrieval. We implemented SSWAP services to respond to web queries and return data. These services are registered with the SSWAP Discovery Server and are available for semantic discovery at http://sswap.info. Results A total of ten services delivering QTL information from Gramene were created. From SoyBase, we created six services delivering information about soybean QTLs, and seven services delivering genetic locus information. For LIS we constructed three services, two of which allow the retrieval of DNA and RNA FASTA sequences with the third service providing nucleic acid sequence comparison capability (BLAST). Conclusions The need for semantic integration technologies has preceded available solutions. We

  5. Applications and methods utilizing the Simple Semantic Web Architecture and Protocol (SSWAP for bioinformatics resource discovery and disparate data and service integration

    Directory of Open Access Journals (Sweden)

    Nelson Rex T

    2010-06-01

    Full Text Available Abstract Background Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of data between information resources difficult and labor intensive. A recently described semantic web protocol, the Simple Semantic Web Architecture and Protocol (SSWAP; pronounced "swap" offers the ability to describe data and services in a semantically meaningful way. We report how three major information resources (Gramene, SoyBase and the Legume Information System [LIS] used SSWAP to semantically describe selected data and web services. Methods We selected high-priority Quantitative Trait Locus (QTL, genomic mapping, trait, phenotypic, and sequence data and associated services such as BLAST for publication, data retrieval, and service invocation via semantic web services. Data and services were mapped to concepts and categories as implemented in legacy and de novo community ontologies. We used SSWAP to express these offerings in OWL Web Ontology Language (OWL, Resource Description Framework (RDF and eXtensible Markup Language (XML documents, which are appropriate for their semantic discovery and retrieval. We implemented SSWAP services to respond to web queries and return data. These services are registered with the SSWAP Discovery Server and are available for semantic discovery at http://sswap.info. Results A total of ten services delivering QTL information from Gramene were created. From SoyBase, we created six services delivering information about soybean QTLs, and seven services delivering genetic locus information. For LIS we constructed three services, two of which allow the retrieval of DNA and RNA FASTA sequences with the third service providing nucleic acid sequence comparison capability (BLAST. Conclusions The need for semantic integration technologies has preceded

  6. Model authoring system for fail safe analysis

    Science.gov (United States)

    Sikora, Scott E.

    1990-01-01

    The Model Authoring System is a prototype software application for generating fault tree analyses and failure mode and effects analyses for circuit designs. Utilizing established artificial intelligence and expert system techniques, the circuits are modeled as a frame-based knowledge base in an expert system shell, which allows the use of object oriented programming and an inference engine. The behavior of the circuit is then captured through IF-THEN rules, which then are searched to generate either a graphical fault tree analysis or failure modes and effects analysis. Sophisticated authoring techniques allow the circuit to be easily modeled, permit its behavior to be quickly defined, and provide abstraction features to deal with complexity.

  7. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  8. A Rapid and Efficient Sonogashira Protocol and Improved Synthesis of Free Fatty Acid 1 (FFA1) Receptor Agonists

    DEFF Research Database (Denmark)

    Christiansen, Elisabeth; Due-Hansen, Maria E; Ulven, Trond

    2010-01-01

    A protocol for rapid and efficient Pd/Cu-catalyzed coupling of aryl bromides and iodides to terminal alkynes has been developed with use of 2-(di-tert-butylphosphino)-N-phenylindole (cataCXium PIntB) as ligand in TMEDA and water. The new protocol successfully couples substrates which failed with...

  9. Erika's Stories: Literacy Solutions for a Failing Middle School Student

    Science.gov (United States)

    Ma'ayan, Hadar Dubowsky

    2010-01-01

    Erika was a failing student at a large urban public middle school. She was poor, Hispanic, bilingual, and had repeated fourth grade. She scored low on her standardized tests and was failing several subject areas. In class, Erika was a student who sat silently with her head on her desk, and rarely turned in any of her assignments. She was a…

  10. Model Additional Protocol

    International Nuclear Information System (INIS)

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  11. Programming and Application of Master/Slavery Station of Modbus Protocol Based on S7-200 PLC%基于S7-200 PLC的Modbus主从站编程与应用

    Institute of Scientific and Technical Information of China (English)

    熊田忠

    2012-01-01

    从工程需求出发,提出了利用 S7-200 PLC集成免费的Modbus RTU上站和从站通信库,以一个典型实例编程实现S7-200PLC作为工业自动化领域含Modbus通信协议的网络中间设备,具有很好的实用价值.%Programming application of master/slavery station of Modbus RTU protocol by S7-200 PLC is proposed originally from the engineering requirements. Due to its free and integrated Modbus RTU library, the S7-200 acts as a media device in the automation area including Modbus as a typical example. It shows that the method in this paper has a good practical value.

  12. Why some family planning program fail.

    Science.gov (United States)

    1976-04-01

    40 experts representing Nepal, Malaysia, Thailand, Singapore, Korea, and the Philippines participated in a 3-day workshop in Manila in March 1976 for the purpose of discussing and proposing ways of dealing with the financial problems confronting the population programs of the individual countries. The Inter-Governmental Coordinating Committee for Southeast Asia Family/Population Planning sponsored the workshop. The recommendations made at the meeting were: 1) standardization of financing reporting procedures by the region's country programs on family planning; 2) closer coordination between donor agencies and policy-making bodies of country programs in the disbursement of funds; 3) frequent exchanges of experiences, ideas, technicaL knowledge, and other matters pertaining to the financial management of such programs; and 4) inclusion of applicable financial management topics in the training of clinical staffs and those involved in follow-up operations. Additionally, a proposal was made that national population organizations or committees develop research and evaluation units. Workshop discussion sessions focused on financial planning and management, accounting and disbursement of funds, use and control of foreign aid, cost of effectiveness and benefit analysis, and financial reporting. PMID:12309355

  13. Response characteristics of base-isolated structure with hardening-stopper type fail-safe devices

    International Nuclear Information System (INIS)

    In this study, a fail-safe mechanism for backing up the reliability of an isolator device is being developed predicated on the application of a base isolation system to nuclear fuel facilities. 'Fail-safe' is often understood to mean that when a device loses its function, a separate mechanism will work in order that there will be no trouble with regard to safety. However, since it may be considered extremely difficult to support loads without any trouble when the base isolation device itself loses its function, the term will be used here to mean that the base isolation device is supported so that it will not lose its function. The two points below will be made the objectives of design as workings of the fail-safe system in this study. 1) Response Displacement Control: Suppresses excessive deformation of the base isolation device even in case of input of an earthquake greater than the design seismic force to prevent destruction of the base isolation device, superstructure, and connected piping. 2) Response Acceleration Control: Reduces acceleration transmitted to the superstructure insofar as possible by action of the fail-safe mechanism. Characteristics tests and analyses, and earthquake observations using reduced-scale model have now been carried out to grasp the response characteristics of a base isolation combining high-damping rubber bearings and hardening-stopper type fail-safe mechanisms, and the results will be reported below. (author)

  14. Protocol Additional to the Agreement between the United Mexican States and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Mexican States and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 29 March 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the United Mexican States written notification that Mexico's statutory and constitutional requirements for entry into force had been met

  15. Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 June 2004, the date on which the Agency received from Cuba written notification that Cuba's statutory and/or constitutional requirements for entry into force had been met

  16. Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 24 March 1999 and signed in Vienna on 21 June 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2004, the date on which the Agency received from the Republic of Korea written notification that the Republic of Korea's statutory and/or constitutional requirements for entry into force had been met

  17. Protocol Additional to the agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in the United Kingdom of Great Britain and Northern Ireland in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in the United Kingdom of Great Britain and Northern Ireland in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and the United Kingdom had met their respective internal requirements for entry into force

  18. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 July 2006, upon signature by the representatives of the Republic of the Fiji Islands and the Agency

  19. Protocol Additional to the agreement between the Republic of Paraguay and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Paraguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 15 September 2004, the date on which the Agency received from Paraguay written notification that Paraguay's statutory and/or constitutional requirements for entry into force had been met

  20. Protocol Additional to the agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the application of safeguards in connection with the treaty for the prohibition of nuclear weapons in Latin America and the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 18 February 2005, the date on which the Agency received from Nicaragua written notification that Nicaragua's statutory and/or constitutional requirements for entry into force had been met

  1. Protocol Additional to the Agreement between Jamaica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Jamaica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 19 March 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Jamaica and the Agency, i.e. on 19 March 2003

  2. Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model

    Institute of Scientific and Technical Information of China (English)

    Xie Xiao-yao; Zhang Huan-guo

    2004-01-01

    The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze the trans action protocols in the application of electronic commerce.

  3. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  4. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  5. CLINICAL EVALUATION OF FAILED ENDONASAL DCR OPERATIONS AND THEIR MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Mohammed Naveed

    2014-09-01

    Full Text Available INTRODUCTION: Endoscopic Intra nasal approach to by-pass the obstruction of lacrimal apparatus is a simple and commonly practiced surgery among the ENT Surgeons. Various modifications in the form of usage of micro drill, application of Mitomycin C and preserving the nasal flap to line the opening in the sac to name a few are being used. Recurrence of epiphora and closure of the neo opening is described and observed are labeled as failed endonasal DCR. This study makes an attempt to review retrospectively and prospectively to evaluate the degree of recurrence and causes of failure. OBJECTIVE OF THE STUDY: This study also attempts to determine the causes of failure of endonasal DCR and its subsequent management. Thus this study precludes the role of revision DCR. Materials and Methods: 50 patients who underwent endonasal DCR surgery at GGH Kurnool and reported with symptoms of returning of epiphora, purulent discharge from the eye were included. A detailed history taking and endoscopic examination done to find the cause of failure. An attempt is made to classify the causes and find suitable remedy.RESULTS:36% of the patients showed tendency to form synaechiae, 18.6% of patients presented with thick lacrimal crest, 9% of them showed formation of a thin veil like membrane over the neo-ostium. All the patients were subjected to revision surgery and subjective improvement in 92% of the patients reported at the time of reporting of the study.

  6. Analysis of surge line MBLOCA sequences with HPSI failed

    International Nuclear Information System (INIS)

    The main objective of OECD/NEA ROSA-2 Project is to analyze thermal-hydraulic issues relevant to light water reactors (LWR) safety by using Large Scale Test Facility (LSTF) . As a part of this project ROSA-2 test1 has been performed in LSTF during 2009. This test consists of a double ended guillotine break in the surge line, surge line loss-of-coolant accident (SL-LOCA), with high pressure safety injection, (HPSI) failed and reactor coolant pumps trip simultaneously to reactor scram. As part of the participation of Universidad Politecnica de Madrid (UPM) group in OECD/NEA ROSA-2 and Code Applications and Maintenance Program (CAMP) projects two tasks related with this test have been performed. In the first task the simulation of ROSA-2 test1 has been performed with TRAC/RELAP Advanced Computational Engine (TRACE) code. Furthermore, an analysis of similar sequences in a Westinghouse pressurized water reactor (PWR) has been carried out; within this analysis a wide range of break area size has been analyzed: from 0.0254 m to 0.2794 m (1 to 11 inches), and a sensitivity analysis of delay time in the beginning of manual depressurization in the secondary side has been performed. The results show that the sequences with intermediate break sizes, from 0.0508 m to 0.1016 m (2 to 4 inches) have worse consequences in this kind of sequences. (author)

  7. Optimal protocols for slowly driven quantum systems.

    Science.gov (United States)

    Zulkowski, Patrick R; DeWeese, Michael R

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing. PMID:26465432

  8. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  9. Improved protocol to purify untagged amelogenin – Application to murine amelogenin containing the equivalent P70→T point mutation observed in human amelogenesis imperfecta

    Energy Technology Data Exchange (ETDEWEB)

    Buchko, Garry W.; Shaw, Wendy J.

    2015-01-01

    Amelogenin is the predominant extracellular protein responsible for converting carbonated hydroxyapatite into dental enamel, the hardest and most heavily mineralized tissue in vertebrates. Despite much effort, the precise mechanism by which amelogenin regulates enamel formation is not fully understood. To assist efforts aimed at understanding the biochemical mechanism of enamel formation, more facile protocols to purify recombinantly expressed amelogenin, ideally without any tag to assist affinity purification, are advantageous. Here we describe an improved method to purify milligram quantities of amelogenin that exploits its high solubility in 2% glacial acetic acid under conditions of low ionic strength. The method involves heating the frozen cell pellet for two 15 min periods at ~70 ºC with two minutes of sonication in between, dialysis twice in 2% acetic acid (1:250 v/v), and reverse phase chromatography. A further improvement in yield is obtained by resuspending the frozen cell pellet in 6 M guanidine hydrochloride in the first step. The acetic acid heating method is illustrated with a murine amelogenin containing the corresponding P70→T point mutation observed in an human amelogenin associated with amelogenesis imperfecta (P71T), while the guanidine hydrochloride heating method is illustrated with wild type murine amelogenin (M180). The self-assembly properties of P71T were probed by NMR chemical shift perturbation studies as a function of protein (0.1 to 1.8 mM) and NaCl (0 to 367 mM) concentration. Relative to similar studies with wild type murine amelogenin, P71T self-associates at lower protein or salt concentrations with the interactions initiated near the N-terminus.

  10. Modification of Experimental Protocols for a Space Shuttle Flight and Applications for the Analysis of Cytoskeletal Structures During Fertilization, Cell Division , and Development in Sea Urchin Embryos

    Science.gov (United States)

    Chakrabarti, Amitabha; Stoecker, Andrew; Schatten, Heide

    1995-01-01

    To explore the role of microgravity on cytoskeletal organization and skeletal calcium deposition during fertilization, cell division, and early development, the sea urchin was chosen as a model developmental system. Methods were developed to employ light, immunofluorescence, and electron microscopy on cultures being prepared for flight on the Space Shuttle. For analysis of microfilaments, microtubules, centrosomes, and calcium-requiring events, our standard laboratory protocols had to be modified substantially for experimentation on the Space Shuttle. All manipulations were carried out in a closed culture chamber containing 35 ml artificial sea water as a culture fluid. Unfertilized eggs stored for 24 hours in these chambers were fertilized with sperm diluted in sea water and fixed with concentrated fixatives for final fixation in formaldehyde, taxol, EGTA, and MgCl2(exp -6)H2O for 1 cell to 16 cell stages to preserve cytoskeletal structures for simultaneous analysis with light, immunofluorescence, and electron microscopy, and 1.5 percent glutaraldehyde and 0.4 percent formaldehyde for blastula and plueus stages. The fixed samples wre maintained in chambers without degradation for up to two weeks after which the specimens were processed and analyzed with routine methods. Since complex manipulations are not possible in the closed chambers, the fertilization coat was removed from fixation using 0.5 percent freshly prepared sodium thioglycolate solution at pH 10.0 which provided reliable immunofluorescence staining for microtubules. Sperm/egg fusion, mitosis, cytokinesis, and calcium deposition during spicule formatin in early embryogenesis were found to be without artificial alterations when compared to cells fixed fresh and processed with conventional methods.

  11. Protocol for a randomised controlled trial investigating the effectiveness of an online e health application for the prevention of Generalised Anxiety Disorder

    Directory of Open Access Journals (Sweden)

    Kenardy Justin

    2010-03-01

    Full Text Available Abstract Background Generalised Anxiety Disorder (GAD is a highly prevalent psychiatric disorder. Effective prevention in young adulthood has the potential to reduce the prevalence of the disorder, to reduce disability and lower the costs of the disorder to the community. The present trial (the WebGAD trial aims to evaluate the effectiveness of an evidence-based online prevention website for GAD. Methods/Design The principal clinical question under investigation is the effectiveness of an online GAD intervention (E-couch using a community-based sample. We examine whether the effect of the intervention can be maximised by either human support, in the form of telephone calls, or by automated support through emails. The primary outcome will be a reduction in symptoms on the GAD-7 in the active arms relative to the non active intervention arms. Discussion The WebGAD trial will be the first to evaluate the use of an internet-based cognitive behavioural therapy (CBT program contrasted with a credible control condition for the prevention of GAD and the first formal RCT evaluation of a web-based program for GAD using community recruitment. In general, internet-based CBT programs have been shown to be effective for the treatment of other anxiety disorders such as Post Traumatic Stress Disorder, Social Phobia, Panic Disorder and stress in clinical trials; however there is no evidence for the use of internet CBT in the prevention of GAD. Given the severe shortage of therapists identified in Australia and overseas, and the low rates of treatment seeking in those with a mental illness, the successful implementation of this protocol has important practical outcomes. If found to be effective, WebGAD will provide those experiencing GAD with an easily accessible, free, evidence-based prevention tool which can be promoted and disseminated immediately. Trial Registration Controlled-trials.com: ISRCTN76298775

  12. Improved protocol to purify untagged amelogenin - Application to murine amelogenin containing the equivalent P70→T point mutation observed in human amelogenesis imperfecta.

    Science.gov (United States)

    Buchko, Garry W; Shaw, Wendy J

    2015-01-01

    Amelogenin is the predominant extracellular protein responsible for converting carbonated hydroxyapatite into dental enamel, the hardest and most heavily mineralized tissue in vertebrates. Despite much effort, the precise mechanism by which amelogenin regulates enamel formation is not fully understood. To assist efforts aimed at understanding the biochemical mechanism of enamel formation, more facile protocols to purify recombinantly expressed amelogenin, ideally without any tag to assist affinity purification, are advantageous. Here we describe an improved method to purify milligram quantities of amelogenin that exploits its high solubility in 2% glacial acetic acid under conditions of low ionic strength. The method involves heating the frozen cell pellet for two 15min periods at ∼70°C with 2min of sonication in between, dialysis twice in 2% acetic acid (1:250 v/v), and reverse phase chromatography. A further improvement in yield is obtained by resuspending the frozen cell pellet in 6M guanidine hydrochloride in the first step. The acetic acid heating method is illustrated with a murine amelogenin containing the corresponding P70→T point mutation observed in an human amelogenin associated with amelogenesis imperfecta (P71T), while the guanidine hydrochloride heating method is illustrated with wild type murine amelogenin (M180). The self-assembly properties of P71T were probed by NMR chemical shift perturbation studies as a function of protein (0.1-1.8mM) and NaCl (0-367mM) concentration. Relative to similar studies with wild type murine amelogenin, P71T self-associates at lower protein or salt concentrations with the interactions initiated near the N-terminus. PMID:25306873

  13. A Comparative Study of Various Routing Protocols in VANET

    CERN Document Server

    Kumar, Rakesh

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. F inally the paper concludes by a tabular comparison of the various routing protocols for VANET.

  14. Taxonomy and Evaluations of Low-Power Listening Protocols for Machine-to-Machine Networks

    OpenAIRE

    Kwang-il Hwang; Sung-Hyun Yoon

    2014-01-01

    Even though a lot of research has made significant contributions to advances in sensor networks, sensor network protocols, which have different characteristics according to the target application, might confuse machine-to-machine (M2M) network designers when they choose the protocol most suitable for their specific applications. Therefore, this paper provides a well-defined taxonomy of low-power listening protocols by examining in detail the existing low-power sensor network protocols and eva...

  15. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  16. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  17. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  18. Energy Efficient MAC Protocols for Wireless Sensor Network: A Survey

    Directory of Open Access Journals (Sweden)

    Eleazar Chukwuka

    2013-08-01

    Full Text Available Wireless Sensor Network (WSN is an attractive choice for a variety of applications as no wiredinfrastructure is needed. Other wireless networks are not as energy constrained as WSNs, because theymay be plugged into the mains supply or equipped with batteries that are rechargeable and replaceable.Among others, one of the main sources of energy depletion in WSN is communications controlled by theMedium Access Control (MAC protocols. An extensive survey of energy efficient MAC protocols ispresented in this article. We categorise WSN MAC protocols in the following categories: controlled access(CA, random access (RA, slotted protocols (SP and hybrid protocols (HP. We further discuss howenergy efficient MAC protocols have developed from fixed sleep/wake cycles through adaptive to dynamiccycles, thus becoming more responsive to traffic load variations. Finally we present open researchquestions on MAC layer design for WSNs in terms of energy efficiency.

  19. SECURE SHORT MESSAGE PEER-TO-PEER PROTOCOL

    Directory of Open Access Journals (Sweden)

    Saurabh Samanta

    2012-06-01

    Full Text Available Short Message Service (SMS has become an extension of our lives and plays an important role in daily chores. SMS is a popular medium for delivering Value Added Services and are suitable for mobile banking, payment reminders, SOS calls, stock and news alerts, railway and flight enquiries etc. These types of messages are normally computer generated messages sent over Short Message Peer-to-Peer (SMPP protocol. SMPP is an application layer protocol to send messages over TCP/IP connection. SMPP protocol has no security measures specified which allows fast delivery of SMS messages in bulk. Compromised messages or loss of messages can cause lot of revenue loss and fatal consequences. A secure SMPP protocol is proposed and implemented by introducing Transport Layer Security (TLS with SMPP protocol specifications. A client tool is developed to securely connect to the server. Secure Short Message Peer-to-Peer protocol will enhance the security of fast growing messaging and telecommunication world.

  20. A secure RFID authentication protocol adopting error correction code.

    Science.gov (United States)

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  1. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  2. A Review: Multi Protocol Label Switching (Mpls

    Directory of Open Access Journals (Sweden)

    Rashed Qayoom Shawl,

    2014-01-01

    Full Text Available The demand for technology called MPLS is increasing day by day in most internet service provider networks. Majority of the carriers are deploying MPLS in their backbone networks to facilitate a number of services and applications such as virtual private networks, quality of service (QoS and traffic engineering. MPLS is a scalable, protocol-independent protocol. MPLS allows for creating end-to-end circuits across any type of transport medium using any protocol. The primary benefit of MPLS is to eliminate the dependence on a particular OSI model data-link layer technology such as asynchronous transfer mode (ATM, Frame Relay or Ethernet and eliminates the need for multiple layer-2 networks to satisfy different types of traffic. This paper reflects a detailed overview on MPLS with its architectural terminology, working and the services that it offers.

  3. Chapter 22: Compressed Air Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  4. Protocols for Microcontrollers Networks

    OpenAIRE

    López, Ricardo A.

    2011-01-01

    The microcontrollers are embedded in our way of life and are found in many devices. The ability of Very High Scale Integration (VLSI) - with almost exponential growth in recent years makes these devices every day contain functions previously unthinkable. Therefore, a grouping of these networked devices creates a very powerful system, which equipped with a standard protocol that allows interconnection to the Internet gives you a virtually unlimited range of scalability. For these reasons, t...

  5. Seismic protocol urges sensitivity

    International Nuclear Information System (INIS)

    This paper is a preliminary summary of a protocol manual for conducting seismic surveys in various topographic and geographic situations to minimize environmental impacts. The manual aims at addressing unique issues for six different types of ecological environments in such a way as to enhance contractors' overall awareness of the types of environmental issues they may encounter, along with some common sense methods of dealing with them. Those six environments are marine, coastal, rain forest, arctic, semi-level terrains, and mountainous

  6. ‘Do Well B.’: Design Of WELL Being monitoring systems. A study protocol for the application in autism

    Science.gov (United States)

    Dutheil, Frédéric; Chambres, Patrick; Hufnagel, Cédric; Auxiette, Catherine; Chausse, Pierre; Ghozi, Raja; Paugam, Guillaume; Boudet, Gil; Khalfa, Nadia; Naughton, Geraldine; Chamoux, Alain; Mermillod, Martial; Bertrand, Pierre Raphael

    2015-01-01

    Introduction Individuals with autism spectrum disorder (ASD) have difficulties in communication and social interaction resulting from atypical perceptual and cognitive information processing, leading to an accumulation of anxiety. Extreme overloading experienced internally may not be externally visible. Identifying stressful situations at an early stage may avoid socially problematic behaviour from occurring, such as self-injurious behaviour. Activation of the autonomous nervous system (ANS) is involved in the response to anxiety, which can be measured through heart rate variability and skin conductance with the use of portable devices, non-intrusively and pain-free. Thus, developing innovative analysis of signal perception and reaction is necessary, mainly for non-communicative individuals with autism. Methods and analysis The protocol will take place in real life (home and social environments). We aim to associate modifications of the ANS with external events that will be recorded in a synchronous manner through a specific design (spy glasses with video/audio recording). Four phases will be carried out on ASD participants and aged-matched controls: (1) 24-hour baseline pre-experiment (physical activity, sleep), (2) 2 h in a real life situation, (3) 30 min in a quiet environment, interrupted by a few seconds of stressful sound, (4) an interview to record feelings about events triggering anxiety. ASD and control participants will be together for phases 2 and 3, revealing different physiological responses to the same situations, and thus identifying potentially problematic events. The novelty will be to apply time-series analyses (which led to several Nobel Prizes in quantitative finance) on ANS series (heart rate, heart rate variability, skin conductance) and wrist motion. Ethics and dissemination Ethical approval has been obtained from Ethics Committee of Clermont-Ferrand (South-East I), France (2014-A00611–46). Trial findings will be disseminated via open

  7. Security Flaws in a Recent Ultralightweight RFID Protocol

    CERN Document Server

    Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

    2009-01-01

    In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as bitwise XOR, OR, AND, and addition. This combination of operations was revealed later to be insufficient for security. Then, Chien et al. proposed the SASI protocol [4] with the aim of offering better security, by adding the bitwise rotation to the set of supported operations. The SASI protocol represented a milestone in the design of ultralightweight protocols, although certain attacks have been published against this scheme [5, 6, 7]. In 2008, a new protocol, named Gossamer [8], was proposed that can be considered a further development of both the UMAP family and SASI. Although no attacks have been published against Gossamer, Lee et al. [9] have recently published an alternative scheme that is highly reminiscent of SASI. In this paper, we show that Lee et al.'s scheme fails short of many of its security object...

  8. Childhood obesity: parents fail to recognise, general practitioners fail to act.

    LENUS (Irish Health Repository)

    White, A

    2012-01-01

    General Practitioners (GPs) have an important role to play in recognition of and intervention against childhood obesity in Ireland. Data were collected prospectively on a cohort of children aged 4-14 and their parents (n = 101 pairs) who attended consecutively to a semi-rural group general practice. Parents estimated their child\\'s weight status. Actual weight status was determined for both parent and child using the United States Centres\\' for Disease Control\\'s BMI-for-age references. 15 (14.9%) of the children and 49 (51.6%) of the parents were overweight or obese. While 71 (95.5%) of normal weight status children were correctly identified, parents showed poor concordance in identifying their children as overweight 2 (18.2%) or obese 0 (0%). BMI was only evidently recorded in the clinical records of 1 out of 15 cases of overweight children identified. With parents failing to recognise childhood obesity, GPs have a responsibility in tackling this problem at a family level.

  9. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  10. WDM network and multicasting protocol strategies.

    Science.gov (United States)

    Kirci, Pinar; Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  11. Nr 621 - Report on the behalf of the Commission of foreign affairs, defence and armed forces on the bill project on the application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998

    International Nuclear Information System (INIS)

    This report concerns an additional protocol which aims at reinforcing the efficiency of the international guarantee system. This system is part of an international approach for the struggle against nuclear weapon proliferation. The authors outline the necessary evolution of law to deal with the risk of development of clandestine military nuclear programs. They present the role of the IAEA, its organisation, its financing, and outline its reinforced role within the frame of the NPT (Non Proliferation Treaty) and of generalised guarantee agreements (a typology of these agreements is given). They also outline the limits of this guarantee system, and the necessity of its adaptation through an additional protocol. They discuss the difficulty of an international application (notably in the cases of Iran and North Korea). The articles are then discussed. They deal with definitions, declaration obligations, international verification, penal arrangements, arrangements related to overseas territories and other arrangements. The commission discussion is reported, and tables give comparisons between agreements

  12. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Affoua Thérèse Aby

    2016-06-01

    Full Text Available Wireless sensor networks (WSNs are increasingly used in environmental monitoring applications. They are designed to operate for several months by featuring low activity cycles in order to save energy. In this paper, we propose a Medium Access Control (MAC protocol for suchWSNs with very low duty-cycles of 1% and less. Nodes are activated randomly and use a history of previous successful frame exchanges to decide their next activation time. We study the choice of the history size, and we compare the performance of our protocol with other protocols from the literature. We show by simulations and real experiments that with a limited history size of only six entries, our protocol achieves better performance than other protocols from the literature, while keeping the advantages of fully asynchronous protocols.

  13. Implementing a knowledge application program for anxiety and depression in community-based primary mental health care: a multiple case study research protocol

    OpenAIRE

    Roberge, Pasquale; Fournier, Louise; Brouillet, Hélène; Hudon, Catherine; Houle, Janie; Provencher, Martin D.; Lévesque, Jean-Frédéric

    2013-01-01

    Background Anxiety and depressive disorders are increasingly recognized as a health care policy priority. Reducing the treatment gap for common mental disorders requires strengthening the quality of primary mental health care. We developed a knowledge application program designed to improve the organization and delivery of care for anxiety and depression in community-based primary mental health care teams in Quebec, Canada. The principal objectives of the study are: to implement and evaluate ...

  14. Assessing the effect of an interactive decision-aid smartphone smoking cessation application (app) on quit rates: a double-blind automated randomised control trial protocol

    OpenAIRE

    BinDhim, Nasser F; McGeechan, Kevin; Trevena, Lyndal

    2014-01-01

    Introduction In a previous study exploring the feasibility of a smoking cessation application (app), we found that about 77% of the respondents from three countries were ready to quit in the next 30 days without significant differences between countries in terms of age, operating system and number of quitting attempts. However, the efficacy of smartphone apps for smoking cessation has not yet been established. This study tests the efficacy of a smartphone smoking cessation decision-aid app co...

  15. Cryptanalysis and enhancement of two low cost rfid authentication protocols

    CERN Document Server

    Jannati, Hoda

    2012-01-01

    Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight anti-de-synchronization RFID authentication protocol and a lightweight binding proof protocol to guard patient safety are proposed. This contribution provides enough evidence to prove the first introduced protocol vulnerability to de-synchronization attack. It also provides the other protocol's suffering from de-synchronization attack as well as tracking the movements of the tags. This paper also addresses appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.

  16. Council tax precept failed to cover cost of NLW.

    Science.gov (United States)

    2016-08-01

    Charging residents extra council tax to help pay for social care is insufficient to cover current funding gaps and has failed to cover the cost of the national living wage (NLW), a report warns. PMID:27573947

  17. Failing The Final Exam In Equal Employment And Opportunity

    Directory of Open Access Journals (Sweden)

    Greg Tower

    2011-07-01

    Full Text Available Anglo-American educational global leaders are failing the final exam for overall transparency of EEO activities with over 90% non-disclosure.  Australian entities should be modeled as important communication exemplars.

  18. Establishing Pass/Fail Criteria for Bronchoscopy Performance

    DEFF Research Database (Denmark)

    Konge, Lars; Clementsen, Paul; Larsen, Klaus Richter;

    2012-01-01

    Background: Several tools have been created to assess competence in bronchoscopy. However, educational guidelines still use an arbitrary number of performed procedures to decide when basic competency is acquired. Objectives: The purpose of this study was to define pass/fail scores for two...... perform on each item of the test. Results: Using the contrasting-groups method we found a standard that would fail all novices and pass all consultants. A clear pass related to prior experience of 75 procedures. The consequences of using the extended Angoff method were also acceptable: all trainees who...... had performed less than 50 bronchoscopies failed the test and all consultants passed. A clear pass related to 80 procedures. Conclusions: Our proposed pass/fail scores for these two methods seem appropriate in terms of consequences. Prior experience with the performance of 75 and 80 bronchoscopies...

  19. The ugly twins: failed global sourcing projects and their substitutes

    OpenAIRE

    Schiele, Holger; Horn, Philipp; Werner, Welf

    2010-01-01

    Purpose of the paper and literature addressed: Analyzing the impact of failed global sourcing projects on the entire commodity group and exploring isomorphism as potential antecedent to the observed phenomenon. The paper is embedded in the global sourcing literature, as well as isomorphism and total cost analysis. Research method: Secondary data analysis. Research findings: 1) Each failed global sourcing project had an “ugly twin”, i.e. the material which was not delivered by the new supplier...

  20. On the Merit of the Legacy of Failed Olympic Bid

    OpenAIRE

    Torres, Cesar R.

    2012-01-01

    Olympic legacy has become a dominant theme within the Olympic Movement. For decades, legacy concerns were confined to the hosting of the Olympic Games. However, these concerns have been recently extended to the bidding process itself. Cities bidding for the Olympic Games are now required to identify their legacy regardless of the outcome of their bids. This paper explores the merits of extending legacy discourse in case bids failed. It contends that the extension of legacy discourse into fail...

  1. What if the Doha Round Fails? Implications for Canadian Agriculture

    OpenAIRE

    Gifford, Michael N.; McCalla, Alex F.; Karl D. Meilke

    2008-01-01

    Many commentators assume that the WTO Doha Round negotiations have already failed and that this failure will not matter for Canadian agriculture. Neither view is correct. Most countries appear willing to make the effort needed to bring the negotiations to a make or break point in early 2008. If the Doha Round does eventually fail, an important opportunity to make the agricultural trading system significantly less distorted, more open and fair will have been lost. For Canadian agriculture, the...

  2. Fabrication of Confinement Facility of Failed Fuel Elements

    International Nuclear Information System (INIS)

    The confinement facility of failed fuel elements is provide for isolating the elements so that their fission product could not contaminate reactor pool. Since RSG-GAS does not have such facility yet, the fabrication of the confinement is compulsory needed. The fabrication of confinement was initialized by providing technical drawing, materials procurement, fabricating and testing, each confinement capacity is 2 elements. The test result showed that the facility can be used to store the two failed fuel elements safely. (author)

  3. Pictorial essay: Role of ultrasound in failed carpal tunnel decompression

    OpenAIRE

    2012-01-01

    USG has been used for the diagnosis of carpal tunnel syndrome. Scarring and incomplete decompression are the main causes for persistence or recurrence of symptoms. We performed a retrospective study to assess the role of ultrasound in failed carpal tunnel decompression. Of 422 USG studies of the wrist performed at our center over the last 5 years, 14 were for failed carpal tunnel decompression. Scarring was noted in three patients, incomplete decompression in two patients, synovitis in one pa...

  4. The Failed State and the State of Failure

    Directory of Open Access Journals (Sweden)

    Peter Hitchcock

    2008-01-01

    Full Text Available What does Marx have to say about the “failed state”? Less than one might think. Peter Hitchcock seizes on the problem of the organic composition of capital to bring theories of state sovereignty and its dissolution into chiastic relation with Marxist political economy. This flexibly-bound double of Marxism and failed-state theory then offers a new perspective on our current moment and its possible futures.

  5. The Failed State and the State of Failure

    OpenAIRE

    Peter Hitchcock

    2008-01-01

    What does Marx have to say about the “failed state”? Less than one might think. Peter Hitchcock seizes on the problem of the organic composition of capital to bring theories of state sovereignty and its dissolution into chiastic relation with Marxist political economy. This flexibly-bound double of Marxism and failed-state theory then offers a new perspective on our current moment and its possible futures.

  6. Comparison of The Effectiveness of Clomiphene Citrate versus Letrozole in Mild IVF in Poor Prognosis Subfertile Women with Failed IVF Cycles

    Directory of Open Access Journals (Sweden)

    Mesut Oktem

    2015-10-01

    Full Text Available Background: Our objective was to evaluate the effectiveness of clomiphene citrate (CC vs. letrozole (L plus human menopausal gonadotropin (hMG in gonadotropin releasing hormone (GnRH antagonist protocol in poor prognosis women with previous failed ovarian stimulation undergoing intracytoplasmic sperm injection (ICSI. Materials and Methods: This retrospective cohort study included cycles with CC and L plus hMG/GnRH antagonist protocols of 32 poor responders who had failed to have ideal follicles to be retrieved during oocyte pick-up (OPU or embryo transfer (ET at least for 2 previous in vitro fertilization (IVF cycles with microdose flare protocol or GnRH antagonist protocol from January 2006 to December 2009. Main outcome measures were implantation, clinical pregnancy and live birth rates per cycle. Duration of stimulation, mean gonadotropin dose used, endometrial thickness, number of mature follicles, serum estradiol (E2 and progesterone (P levels on the day of human chorionic gonadotropin (hCG administration, number of retrieved oocytes and fertilization rates were also evaluated. Results: A total number of 42 cycles of 32 severe poor responders were evaluated. Total gonadotropin consumption was significantly lower (1491 ± 873 vs. 2808 ± 1581 IU, P=0.005 and mean E2 level on the day of hCG injection were significantly higher in CC group than L group (443.3 ± 255.2 vs. 255.4 ± 285.2 pg/mL, P=0.03. ET, overall pregnancy and live birth rates per cycle were significantly higher in CC than L protocol (27.2 vs. 15%, 13.6 vs. 0% and 4.5 vs. 0%, respectively, P<0.05. Conclusion: Severe poor responders who had previously failed to respond to microdose or GnRH antagonist protocols may benefit from CC plus hMG/GnRH antagonist protocol despite high cancellation rate.

  7. Une approche pour la composition autonome de services de communication orientés QoS. Application aux protocoles de transport configurables

    OpenAIRE

    Van Wambeke, Nicolas

    2009-01-01

    Les dernières évolutions de l’Internet se sont traduites par l’émergence de nouvelles applications distribuées et par la multiplication des technologies réseaux (sans fils, mobiles. . . ) ainsi que des services offerts par les opérateurs sur de nouveaux types de terminaux (portable, PDA. . . ). L’enjeu socio économique majeur de ces avancées est le futur Internet ambiant, à la fois ubiquitaire et intelligent, au travers duquel l’utilisateur pourra, quelle que soit sa localisation ...

  8. Addressing Mobility in Wireless Sensor Media Access Protocol

    OpenAIRE

    Huan Pham; Sanjay Jha

    2005-01-01

    Handling mobility in wireless sensor networks presents several new challenges. Techniques developed for other mobile networks, such as mobile phone or mobile adhoc networks can not be applicable, as in these networks energy is not a very critical resource. This paper presents a new adaptive Mobility-aware Sensor MAC protocol (MS-MAC) for mobile sensor applications. In MS-MAC protocol, a node detects its neighbor's mobility based on a change in its received signal level from the neighbor, or a...

  9. Efficacy and tolerance of the topical application of potassium hydroxide (10% and 15% in the treatment of molluscum contagiosum: Randomized clinical trial: Research protocol

    Directory of Open Access Journals (Sweden)

    Galindo Gisela

    2011-10-01

    Full Text Available Abstract Background Molluscum contagiosum is a non-severe pediatric viral infection. Because it is highly contagious and current treatments have negative aesthetic and psychological effects, we want to test an alternative treatment in the primary care setting, consisting of two different concentrations of potassium hydroxide solution. Methods/design The study design is a double-blind, randomized clinical trial, using three types of topical treatment. The treatment consist of daily applications of potassium hydroxide (KOH in aqueous solution at 10% and 15% concentration, and a placebo administered in the control group. Four follow-up visits (at 15, 30, 45 and 60 days are planned to evaluate treatment effectiveness and patient tolerance. The main outcome measure of the trial will be the healing rate, defined as lesion disappearance in the affected zones after the topic application of the experimental treatment. Secondary measures will be the principal characteristics and evolution of the affected zone (surface area, number of lesions, size and density of lesions, treatment tolerance (hyperpigmentation, itching, burning, pain, recurrence rate and the natural evolution of lesions in the control group. Discussion KOH can potentially be an effective and safe treatment for MC in primary care, and can also reduce referrals to dermatologists and hospital pediatric departments. In addition, KOH may be a valid and less expensive alternative to current invasive treatments (surgical excision. Trial Registration ClinicalTrials.gov: NCT01348386

  10. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  11. Updatable Queue Protocol Based On TCP For Virtual Reality Environment

    CERN Document Server

    Al-Howaide, Ala'a Z; Salhieh, Ayad M

    2011-01-01

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements of these applications make the scalability problem more difficult to solve. In this paper, we have implemented Updatable Queue Abstraction protocol (UQA) on TCP (TCP-UQA) and compared it with original TCP, UDP, and Updatable Queue Abstraction based on UDP (UDP-UQA) protocols. Results showed that TCP-UQA was the best in queue management.

  12. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  13. EMMP :a highly efficient membership management protocol

    Institute of Scientific and Technical Information of China (English)

    LI Renfa; XIE Yunlong; WEN Jigang; YUE Guangxue

    2007-01-01

    Gossip (or epidemic) algorithms have recently become popular solutions to multicast message dissemination in peer-to-peer systems.Nevertheless,it is not straightforward to apply gossip to on-demand streaming because it often fails to achieve a timely delivery.To solve this problem and taking into account the characteristic of peers randomly joining and leaving in peer-to-peer systems,an Efficient Membership Management Protocol (EMMP) has been presented.Every node only needs to keep contact with O (log(N)) nodes,and EMMP can support the reliable dissemination of messages.Considering the "distance" between peers,it causes the major data to be transmitted in a local area and reduces the backbone's traffic,and speeds up the dissemination of messages between peers.This paper has adopted the"goodfriend" mechanism to reduce the influence on the system when a peer fails or leaves.Simulation results show that EMMP is highly efficient,and both the redundancy and the delay of the system are well solved.

  14. Behavioral activation-based guided self-help treatment administered through a smartphone application: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ly Kien

    2012-05-01

    Full Text Available Abstract Background The need for cost-effective interventions for people suffering from major depressive disorders is essential. Behavioral activation is an intervention that can largely benefit from the use of new mobile technologies (for example smartphones. Therefore, developing smartphone-based behavioral activation interventions might be a way to develop cost-effective treatments for people suffering from major depressive disorders. The aim of this study will be to test the effects of a smartphone-delivered behavioral activation treatment. Methods The study will be a randomized controlled trial with a sample size of 120 participants, with 60 patients in each group. The treatment group includes an 8-week smartphone-based behavioral activation intervention, with minimal therapist contact. The smartphone-based intervention consists of a web-based psychoeducation, and a smartphone application. There is also a back-end system where the therapist can see reports from the patients or activities being reported. In the attention control group, we will include brief online education and then recommend use of a smartphone application that is not directly aimed at depression (for example, ‘Effective meditation’. The duration of the control condition will also be 8 weeks. For ethical reasons we will give the participants in the control group access to the behavioral activation treatment following the 8-week treatment period. Discussions We believe that this trial has at least three important implications. First, we believe that smartphones can be integrated even further into society and therefore may serve an important role in health care. Second, while behavioral activation is a psychological treatment approach for which there is empirical support, the use of a smartphone application could serve as the therapist’s prolonged arm into the daily life of the patient. Third, as we have been doing trials on guided Internet treatment for more than 10

  15. Agreement of 3 August 1992 between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with the Republic of Malawi to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  16. The Text of the Agreement between the Lesotho and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with the Kingdom of Lesotho to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  17. Agreement between the Holy See and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An agreement by Exchange of Letters with the Holy See to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between the Holy See and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  18. The Text of the Agreement of 14 January 1980 between Senegal and the Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with Senegal to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between Senegal and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  19. The Text of the Agreement between Iceland and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with Iceland to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  20. The Text of the Agreement of 8 August 1978 between Gambia and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with the Republic of The Gambia to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency