WorldWideScience

Sample records for applicable protocol fails

  1. Cryopreserved embryo transfer: adjacent or non-adjacent to failed fresh long GnRH-agonist protocol IVF cycle.

    Science.gov (United States)

    Volodarsky-Perel, Alexander; Eldar-Geva, Talia; Holzer, Hananel E G; Schonberger, Oshrat; Reichman, Orna; Gal, Michael

    2017-03-01

    The optimal time to perform cryopreserved embryo transfer (CET) after a failed oocyte retrieval-embryo transfer (OR-ET) cycle is unknown. Similar clinical pregnancy rates were recently reported in immediate and delayed CET, performed after failed fresh OR-ET, in cycles with the gonadotrophin-releasing hormone (GnRH) antagonist protocol. This study compared outcomes of CET performed adjacently (<50 days, n = 67) and non-adjacently (≥50 to 120 days, n = 62) to the last OR-day of cycles with the GnRH agonist down-regulation protocol. Additional inclusion criteria were patients' age 20-38 years, the transfer of only 1-2 cryopreserved embryos, one treatment cycle per patient and artificial preparation for CET. Significantly higher implantation, clinical pregnancy and live birth rates were found in the non-adjacent group than in the adjacent group: 30.5% versus 11.3% (P = 0.001), 41.9% versus 17.9% (P = 0.003) and 32.3% versus 13.4% (P = 0.01), respectively. These results support the postponement of CET after a failed OR-ET for at least one menstrual cycle, when a preceding long GnRH-agonist protocol is used. Copyright © 2016 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  2. Statistical Requirements For Pass-Fail Testing Of Contraband Detection Systems

    International Nuclear Information System (INIS)

    Gilliam, David M.

    2011-01-01

    Contraband detection systems for homeland security applications are typically tested for probability of detection (PD) and probability of false alarm (PFA) using pass-fail testing protocols. Test protocols usually require specified values for PD and PFA to be demonstrated at a specified level of statistical confidence CL. Based on a recent more theoretical treatment of this subject [1], this summary reviews the definition of CL and provides formulas and spreadsheet functions for constructing tables of general test requirements and for determining the minimum number of tests required. The formulas and tables in this article may be generally applied to many other applications of pass-fail testing, in addition to testing of contraband detection systems.

  3. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  4. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  5. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  6. Simulating fail-stop in asynchronous distributed systems

    Science.gov (United States)

    Sabel, Laura; Marzullo, Keith

    1994-01-01

    The fail-stop failure model appears frequently in the distributed systems literature. However, in an asynchronous distributed system, the fail-stop model cannot be implemented. In particular, it is impossible to reliably detect crash failures in an asynchronous system. In this paper, we show that it is possible to specify and implement a failure model that is indistinguishable from the fail-stop model from the point of view of any process within an asynchronous system. We give necessary conditions for a failure model to be indistinguishable from the fail-stop model, and derive lower bounds on the amount of process replication needed to implement such a failure model. We present a simple one-round protocol for implementing one such failure model, which we call simulated fail-stop.

  7. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  8. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    Science.gov (United States)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  9. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    Moeller, S; Newe, T; Lochmann, S

    2009-01-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  10. Application Framework with Abstractions for Protocol and Agent Role

    DEFF Research Database (Denmark)

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent ...... roles are supported by a simple and expressive application framework....

  11. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  12. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Alasdair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer Rhodes [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rosewater, David Martin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-04-01

    This Protocol provides a set of “best practices” for characterizing energy storage systems (ESSs) and measuring and reporting their performance. It serves as a basis for assessing how an ESS will perform with respect to key performance attributes relevant to different applications. It is intended to provide a valid and accurate basis for the comparison of different ESSs. By achieving the stated purpose, the Protocol will enable more informed decision-making in the selection of ESSs for various stationary applications. The Protocol identifies general information and technical specifications relevant in describing an ESS and also defines a set of test, measurement, and evaluation criteria with which to express the performance of ESSs that are intended for energy-intensive and/or power-intensive stationary applications. An ESS includes a storage device, battery management system, and any power conversion systems installed with the storage device. The Protocol is agnostic with respect to the storage technology and the size and rating of the ESS. The Protocol does not apply to single-use storage devices and storage devices that are not coupled with power conversion systems, nor does it address safety, security, or operations and maintenance of ESSs, or provide any pass/fail criteria.

  13. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  14. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  15. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  16. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  17. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  18. Influence of Whitening Gel Application Protocol on Dental Color Change

    Directory of Open Access Journals (Sweden)

    Taciana Marco Ferraz Caneppele

    2015-01-01

    Full Text Available Objectives. To evaluate the influence of different whitening protocols on the efficacy of 35% hydrogen peroxide (HP tooth whitening and gel pH and concentration. Material and Methods. Eighty-four enamel/dentin discs from bovine incisors were used. The baseline color was measured with a spectrophotometer. Two sessions of in-office whitening with 35% HP were performed under different protocols: G1: 3 applications of HP (10 min each per session; G2: 1 application of 30 min per session; G3: 1 application of 40 min per session, with no gel replenishment within session for groups 2 and 3. HP titration and pH evaluation at baseline, after 10, 30, and 40 min were also performed. The final color was measured 24 h after the 1st and 2nd whitening sessions. Data were submitted to Repeated Measures ANOVA and Tukey’s test. Results. For color evaluation, no differences were observed among groups after two sessions. HP titration showed no drop on concentration after 10, 30, or 40 min. The pH was 5.54 at baseline and 5.41 after 40 min. Conclusion. Replenishment or extended application time of in-office whitening gel does not affect gel pH and concentration, a fact that supports the similar effectiveness of whitening observed among the tested protocols.

  19. Application of Protocol-Oriented MVVM Architecture in iOS Development

    OpenAIRE

    Luong Nguyen, Khoi Nguyen

    2017-01-01

    The mobile application industry is fast paced. Requirements change, additions of new features occur on a daily basis and demand frequent code structure adjustment. Thus, a flexible and maintainable software architecture is often a key factor for an application’s success. The major objective of this thesis is to propose a practical use case of Protocol Oriented Model View View Model, an architecture inspired by the Protocol Oriented Programming paradigm. This thesis explains the architectur...

  20. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  1. Modelling a New Product Model on the Basis of an Existing STEP Application Protocol

    Directory of Open Access Journals (Sweden)

    B.-R. Hoehn

    2005-01-01

    Full Text Available During the last years a great range of computer aided tools has been generated to support the development process of various products. The goal of a continuous data flow, needed for high efficiency, requires powerful standards for the data exchange. At the FZG (Gear Research Centre of the Technical University of Munich there was a need for a common gear data format for data exchange between gear calculation programs. The STEP standard ISO 10303 was developed for this type of purpose, but a suitable definition of gear data was still missing, even in the Application Protocol AP 214, developed for the design process in the automotive industry. The creation of a new STEP Application Protocol or the extension of existing protocol would be a very time consumpting normative process. So a new method was introduced by FZG. Some very general definitions of an Application Protocol (here AP 214 were used to determine rules for an exact specification of the required kind of data. In this case a product model for gear units was defined based on elements of the AP 214. Therefore no change of the Application Protocol is necessary. Meanwhile the product model for gear units has been published as a VDMA paper and successfully introduced for data exchange within the German gear industry associated with FVA (German Research Organisation for Gears and Transmissions. This method can also be adopted for other applications not yet sufficiently defined by STEP. 

  2. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  5. Failing Failed States

    DEFF Research Database (Denmark)

    Holm, Hans-Henrik

    2002-01-01

    coverage. A Danish survey of newsrooms shows that the national world-view and prevalent news criteria prevent consistent coverage. It is argued that politicians are the ones who determine national agendas: it is from political initiatives, rather than media coverage, that failing states and humanitarian......When states are failing, when basic state functions are no longer carried out, and when people have no security, humanitarian crises erupt. In confronting this problem, the stronger states have followed an ad hoc policy of intervention and aid. In some cases, humanitarian disasters have resulted...... from inaction. Often, the media are blamed. Politicians complain about the media when they interfere (the CNN effect), and when they do not. This article looks at how the media do cover failing states. Sierra Leone and Congo are used as examples. The analysis shows that there is little independent...

  6. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  7. The effect of local cryotherapy on subjective and objective recovery characteristics following an exhaustive jump protocol.

    Science.gov (United States)

    Hohenauer, Erich; Clarys, Peter; Baeyens, Jean-Pierre; Clijsen, Ron

    2016-01-01

    The purpose of this controlled trial was to investigate the effects of a single local cryotherapy session on the recovery characteristics over a period of 72 hours. Twenty-two young and healthy female (n=17; mean age: 21.9±1.1 years) and male (n=5;mean age: 25.4±2.8 years) adults participated in this study. Following an exhaustive jump protocol (3×30 countermovement jumps), half of the participants received either a single local cryotherapy application (+8°C) or a single local thermoneutral application (+32°C) of 20-minute duration using two thigh cuffs. Subjective measures of recovery (delayed-onset muscle soreness and ratings of perceived exertion) and objective measures of recovery (vertical jump performance and peak power output) were assessed immediately following the postexercise applications (0 hours) and at 24 hours, 48 hours, and 72 hours after the jump protocol. Local cryotherapy failed to significantly affect any subjective recovery variable during the 72-hour recovery period (P>0.05). After 72 hours, the ratings of perceived exertion were significantly lower in the thermoneutral group compared to that in the cryotherapy group (P=0.002). No significant differences were observed between the cryotherapy and the thermoneutral groups with respect to any of the objective recovery variables. In this experimental study, a 20-minute cryotherapy cuff application failed to demonstrate a positive effect on any objective measures of recovery. The effects of local thermoneutral application on subjective recovery characteristics were superior when compared to the effects of local cryotherapy application at 72 hours postapplication.

  8. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  9. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  10. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  11. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  12. Failed fuel action plan guidelines: Special report

    International Nuclear Information System (INIS)

    1987-11-01

    The objective of this document is to provide a generic guideline that can be used to formulate a failed fuel action plan (FFAP) for specific application by a utility. This document is intended to be part of a comprehensive fuel reliability monitoring, management, and improvement program. The utilities may utilize this document as one resource in developing a failed fuel action plan. This document is not intended to be used as a failed fuel action plan standard. This document is intended to provide guidance on: management responsibilities; fuel performance parameters; cost/benefit analysis; action levels; long-term improvement methods; and data collection, analysis, and trending. 3 refs., 4 figs., 6 tabs

  13. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    Science.gov (United States)

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two

  14. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2018-06-01

    Full Text Available The Internet of Things (IoT utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN, but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN, which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO and the Security-Enhanced Option (SEO. The protocol is validated through Burrows–Abadi–Needham (BAN logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with

  15. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  16. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  17. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  18. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  19. A protocol for amide bond formation with electron deficient amines and sterically hindered substrates

    DEFF Research Database (Denmark)

    Due-Hansen, Maria E; Pandey, Sunil K; Christiansen, Elisabeth

    2016-01-01

    A protocol for amide coupling by in situ formation of acyl fluorides and reaction with amines at elevated temperature has been developed and found to be efficient for coupling of sterically hindered substrates and electron deficient amines where standard methods failed.......A protocol for amide coupling by in situ formation of acyl fluorides and reaction with amines at elevated temperature has been developed and found to be efficient for coupling of sterically hindered substrates and electron deficient amines where standard methods failed....

  20. The Application of RPL Routing Protocol in Low Power Wireless Sensor and Lossy Networks

    Directory of Open Access Journals (Sweden)

    Xun Yang

    2014-05-01

    Full Text Available With the continuous development of computer information technology, wireless sensor has been successfully changed the mode of human life, at the same time, as one of the technologies continues to improve the future life, how to better integration with the RPL routing protocols together become one of research focuses in the current climate. This paper start from the wireless sensor network, briefly discusses the concept, followed by systematic exposition of RPL routing protocol developed background, relevant standards, working principle, topology and related terms, and finally explore the RPL routing protocol in wireless sensor low power lossy network applications.

  1. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  2. Comparison of The Effectiveness of Clomiphene Citrate versus Letrozole in Mild IVF in Poor Prognosis Subfertile Women with Failed IVF Cycles

    Directory of Open Access Journals (Sweden)

    Mesut Oktem

    2015-10-01

    Full Text Available Background: Our objective was to evaluate the effectiveness of clomiphene citrate (CC vs. letrozole (L plus human menopausal gonadotropin (hMG in gonadotropin releasing hormone (GnRH antagonist protocol in poor prognosis women with previous failed ovarian stimulation undergoing intracytoplasmic sperm injection (ICSI. Materials and Methods: This retrospective cohort study included cycles with CC and L plus hMG/GnRH antagonist protocols of 32 poor responders who had failed to have ideal follicles to be retrieved during oocyte pick-up (OPU or embryo transfer (ET at least for 2 previous in vitro fertilization (IVF cycles with microdose flare protocol or GnRH antagonist protocol from January 2006 to December 2009. Main outcome measures were implantation, clinical pregnancy and live birth rates per cycle. Duration of stimulation, mean gonadotropin dose used, endometrial thickness, number of mature follicles, serum estradiol (E2 and progesterone (P levels on the day of human chorionic gonadotropin (hCG administration, number of retrieved oocytes and fertilization rates were also evaluated. Results: A total number of 42 cycles of 32 severe poor responders were evaluated. Total gonadotropin consumption was significantly lower (1491 ± 873 vs. 2808 ± 1581 IU, P=0.005 and mean E2 level on the day of hCG injection were significantly higher in CC group than L group (443.3 ± 255.2 vs. 255.4 ± 285.2 pg/mL, P=0.03. ET, overall pregnancy and live birth rates per cycle were significantly higher in CC than L protocol (27.2 vs. 15%, 13.6 vs. 0% and 4.5 vs. 0%, respectively, P<0.05. Conclusion: Severe poor responders who had previously failed to respond to microdose or GnRH antagonist protocols may benefit from CC plus hMG/GnRH antagonist protocol despite high cancellation rate.

  3. 12 CFR 225.83 - What are the consequences of failing to continue to meet applicable capital and management...

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false What are the consequences of failing to continue to meet applicable capital and management requirements? 225.83 Section 225.83 Banks and Banking... AND CHANGE IN BANK CONTROL (REGULATION Y) Regulations Financial Holding Companies § 225.83 What are...

  4. Nuclear liability: Joint protocol relating to the application of the Vienna Convention and the Paris Convention, 1988

    International Nuclear Information System (INIS)

    1989-10-01

    The Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met in Vienna, at the Headquarters of the International Atomic Energy Agency on 21 September 1988. The Joint Protocol establishes a link between the Paris Convention on Third Party Liability in the Field of Nuclear Energy of 1960 and the Vienna Convention on Civil Liability for Nuclear Damage of 1963. The Joint Protocol will extend to the States adhering to it the coverage of the two Conventions. It will also resolve potential conflicts of law, which could result from the simultaneous application of the two Conventions to the same nuclear accident. The Conference on the Relationship between the Paris Convention and the Vienna Convention was jointly organized by the International Atomic Energy Agency and the OECD Nuclear Energy Agency. This publication contains the text of the Final Act of the Conference in the six authentic languages, the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention, also in the six authentic languages and an explanatory note, prepared by the IAEA and NEA Secretariats, providing background information on the content of the Joint Protocol

  5. Optimised to Fail: Card Readers for Online Banking

    Science.gov (United States)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  6. Remote control of the industry processes. POWERLINK protocol application

    Science.gov (United States)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  7. Saving Natural Teeth: Intentional Replantation-Protocol and Case Series.

    Science.gov (United States)

    Grzanich, Derek; Rizzo, Gabriella; Silva, Renato Menezes

    2017-12-01

    Intentional replantation is a reliable and predictable treatment for cases in which nonsurgical endodontic retreatment failed or is impractical and endodontic surgery is hampered because of anatomic limitations. This article presents a protocol for intentional replantation illustrated with some interesting cases. The cases presented here are from patients (average age, 61 years) with no contributing medical history. The cases are molars with previous failed endodontic treatment/retreatment and diagnosed with apical periodontitis. Treatment procedures included atraumatic extractions with minimal manipulations of the periodontal ligament, followed by root-end resection, root-end preparation with ultrasonic tips, root-end fill with bioceramic cement, and rapid tooth replacement into the socket. Granulomatous tissue was gently curetted when applicable. All procedures were performed under the microscope. Intentional replantation with careful case selection may be considered as a last option for preserving hopeless teeth. Atraumatic extraction by using state-of-the-art equipment, instruments, and materials, minimal extra-alveolar time, and maintaining an aseptic technique are key factors for success. Copyright © 2017 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  8. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  9. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  10. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  11. A Distance Bounding Protocol for Location-Cloaked Applications.

    Science.gov (United States)

    Molina-Martínez, Cristián; Galdames, Patricio; Duran-Faundez, Cristian

    2018-04-26

    Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP)—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier) may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover). However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation.

  12. A Distance Bounding Protocol for Location-Cloaked Applications

    Directory of Open Access Journals (Sweden)

    Cristián Molina-Martínez

    2018-04-01

    Full Text Available Location-based services (LBSs assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover. However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation.

  13. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    OpenAIRE

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the protocol-centred paradigm. We argue that interaction systems that support application-level interactions should be explicitly designed, using the externally observable behaviour of the interaction ...

  14. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  15. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  16. The Use of Grid Storage Protocols for Healthcare Applications

    CERN Document Server

    Donno, F; CERN. Geneva. IT Department

    2008-01-01

    Grid computing has attracted worldwide attention for a variety of domains. Healthcare projects focus on data mining and standardization techniques, the issue of data accessibility and transparency over the storage systems on the Grid has seldom been tackled. In this position paper, we identify the key issues and requirements imposed by Healthcare applications and point out how Grid Storage Technology can be used to satisfy those requirements. The main contribution of this work is the identification of the characteristics and protocols that make Grid Storage technology attractive for building a Healthcare data storage infrastructure.

  17. Fast protocol for radiochromic film dosimetry using a cloud computing web application.

    Science.gov (United States)

    Calvo-Ortega, Juan-Francisco; Pozo, Miquel; Moragues, Sandra; Casals, Joan

    2017-07-01

    To investigate the feasibility of a fast protocol for radiochromic film dosimetry to verify intensity-modulated radiotherapy (IMRT) plans. EBT3 film dosimetry was conducted in this study using the triple-channel method implemented in the cloud computing application (Radiochromic.com). We described a fast protocol for radiochromic film dosimetry to obtain measurement results within 1h. Ten IMRT plans were delivered to evaluate the feasibility of the fast protocol. The dose distribution of the verification film was derived at 15, 30, 45min using the fast protocol and also at 24h after completing the irradiation. The four dose maps obtained per plan were compared using global and local gamma index (5%/3mm) with the calculated one by the treatment planning system. Gamma passing rates obtained for 15, 30 and 45min post-exposure were compared with those obtained after 24h. Small differences respect to the 24h protocol were found in the gamma passing rates obtained for films digitized at 15min (global: 99.6%±0.9% vs. 99.7%±0.5%; local: 96.3%±3.4% vs. 96.3%±3.8%), at 30min (global: 99.5%±0.9% vs. 99.7%±0.5%; local: 96.5%±3.2% vs. 96.3±3.8%) and at 45min (global: 99.2%±1.5% vs. 99.7%±0.5%; local: 96.1%±3.8% vs. 96.3±3.8%). The fast protocol permits dosimetric results within 1h when IMRT plans are verified, with similar results as those reported by the standard 24h protocol. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  18. Post-deportation risks for failed asylum seekers

    Directory of Open Access Journals (Sweden)

    Jill Alpes

    2017-02-01

    Full Text Available What happens to people who are deported after their asylum applications have failed? Many who are deported are at risk of harm when they return to their country of origin but there is little monitoring done of deportation outcomes.

  19. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  20. Development of a new Emergency Medicine Spinal Immobilization Protocol for trauma patients and a test of applicability by German emergency care providers.

    Science.gov (United States)

    Kreinest, Michael; Gliwitzky, Bernhard; Schüler, Svenja; Grützner, Paul A; Münzberg, Matthias

    2016-05-14

    In order to match the challenges of quickly recognizing and treating any life-threatening injuries, the ABCDE principles were established for the assessment and treatment of trauma patients. The high priority of spine protection is emphasized by the fact that immobilization of the cervical spine is performed at the very first step in the ABCDE principles. Immobilization is typically performed to prevent or minimize secondary damage to the spinal cord if instability of the spinal column is suspected. Due to increasing reports about disadvantages of spinal immobilization, the indications for performing spinal immobilization must be refined. The aim of this study was (i) to develop a protocol that supports decision-making for spinal immobilization in adult trauma patients and (ii) to carry out the first applicability test by emergency medical personnel. A structured literature search considering the literature from 1980 to 2014 was performed. Based on this literature and on the current guidelines, a new protocol that supports on scene decision-making for spinal immobilization has been developed. Parameters found in the literature concerning mechanisms and factors increasing the likelihood of spinal injury have been included in the new protocol. In order to test the applicability of the new protocol two surveys were performed on German emergency care providers by means of a questionnaire focused on correct decision-making if applying the protocol. Based on the current literature and guidelines, the Emergency Medicine Spinal Immobilization Protocol (E.M.S. IMMO Protocol) for adult trauma patients was developed. Following a fist applicability test involving 21 participants, the first version of the E.M.S. IMMO Protocol has to be graphically re-organized. A second applicability test comprised 50 participants with the current version of the protocol confirmed good applicability. Questions regarding immobilization of trauma patients could be answered properly using the E

  1. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Directory of Open Access Journals (Sweden)

    Alvaro Carvajal-Flórez

    2016-04-01

    Full Text Available ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS of the American Board of Orthodontics (ABO. Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG consisted of 17 patients (19.88 ± 4.4 years old treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old selected by stratified randomization without finishing intervention (CG. Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048, respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8 (p = 0.009 and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6 (p = 0.007. Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8 (p = 0.62 and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9 (p = 0.65. Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system.

  2. Compact wireless control network protocol with fast path switching

    Directory of Open Access Journals (Sweden)

    Yasutaka Kawamoto

    2017-08-01

    Full Text Available Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER, such as wireless control networks, often adopt time division multiple access (TDMA. However, it is difficult to add or adjust functions in protocol stacks that use TDMA methods. Therefore, to add or adjust functions easily, we propose NES-SOURCE, a compact wireless control network protocol with a fast path-switching function. NES-SOURCE is implemented using carrier sense multiple access/collision avoidance (CSMA/CA rather than TDMA. Wireless control networks that use TDMA prevent communication failure by duplicating the communication path. If CSMA/CA networks use duplicate paths, collisions occur frequently, and communication will fail. NES-SOURCE switches paths quickly when communication fails, which reduces the effect of communication failures. Since NES-SOURCE is implemented using CSMA/CA rather than TDMA, the implementation scale is less than one-half that of existing network stacks. Furthermore, since NES-SOURCE’s code complexity is low, functions can be added or adjusted easily and quickly. Communication failures occur owing to changes in the communication environment and collisions. Experimental results demonstrate that the proposed NES-SOURCE’s path-switching function reduces the amount of communication failures when the communication environment changes owing to human movement and others. Furthermore, we clarify the relationships among the probability of a changing communication environment, the collision occurrence rate, and the PER of NES-SOURCE.

  3. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  4. Transition from failing dentition to complete-arch implant rehabilitation with a staged approach: a 3-year clinical report.

    Science.gov (United States)

    Papaspyridakos, Panos; Chronopoulos, Vasilios

    2014-09-01

    The transition of patients from failing dentition to complete-arch implant rehabilitation often means that the patient is rendered edentulous and has to wear a removable complete denture for a time. Many patients find this objectionable. A staged treatment approach provides a fixed interim prosthesis for use throughout the rehabilitation process, allowing patient comfort and prosthodontic control. This clinical report describes a staged approach protocol with a new type of interim prosthesis. The prosthesis is supported by hopeless teeth and the soft tissues of the maxillary tuberosities and mandibular retromolar pads for the complete-arch implant rehabilitation of a patient with failing dentition. This protocol allows for a fixed interim prosthesis with combined tooth and mucosa or implant support during the entire rehabilitation process, thus avoiding the use of complete dentures. The implants and prostheses were functioning successfully after 3 years of clinical service. Copyright © 2014 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  5. Systematic Literature Review Protocol: Teaching Novices Programming Using Robots

    Science.gov (United States)

    Major, Louis

    2010-01-01

    Teaching computer programming to novices is a difficult task due to the complex nature of the subject, as negative stereotypes are associated with programming and because introductory programming courses often fail to encourage student understanding. This Protocol outlines the plan that is to be followed in order to investigate the effectiveness…

  6. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  7. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  8. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    DEFF Research Database (Denmark)

    Burgy, Laurent; Reveillere, Laurent; Lawall, Julia Laetitia

    2007-01-01

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain...

  9. Fail-safe computer-based plant protection systems

    International Nuclear Information System (INIS)

    Keats, A.B.

    1983-01-01

    A fail-safe mode of operation for computers used in nuclear reactor protection systems was first evolved in the UK for application to a sodium cooled fast reactor. The fail-safe properties of both the hardware and the software were achieved by permanently connecting test signals to some of the multiplexed inputs. This results in an unambiguous data pattern, each time the inputs are sequentially scanned by the multiplexer. The ''test inputs'' simulate transient excursions beyond defined safe limits. The alternating response of the trip algorithms to the ''out-of-limits'' test signals and the normal plant measurements is recognised by hardwired pattern recognition logic external to the computer system. For more general application to plant protection systems, a ''Test Signal Generator'' (TSG) is used to compute and generate test signals derived from prevailing operational conditions. The TSG, from its knowledge of the sensitivity of the trip algorithm to each of the input variables, generates a ''test disturbance'' which is superimposed upon each variable in turn, to simulate a transient excursion beyond the safe limits. The ''tripped'' status yielded by the trip algorithm when using data from a ''disturbed'' input forms part of a pattern determined by the order in which the disturbances are applied to the multiplexer inputs. The data pattern formed by the interleaved test disturbances is again recognised by logic external to the protection system's computers. This fail-safe mode of operation of computer-based protection systems provides a powerful defence against common-mode failure. It also reduces the importance of software verification in the licensing procedure. (author)

  10. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  11. A Rapid and Efficient Sonogashira Protocol and Improved Synthesis of Free Fatty Acid 1 (FFA1) Receptor Agonists

    DEFF Research Database (Denmark)

    Christiansen, Elisabeth; Due-Hansen, Maria E; Ulven, Trond

    2010-01-01

    A protocol for rapid and efficient Pd/Cu-catalyzed coupling of aryl bromides and iodides to terminal alkynes has been developed with use of 2-(di-tert-butylphosphino)-N-phenylindole (cataCXium PIntB) as ligand in TMEDA and water. The new protocol successfully couples substrates which failed...

  12. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  13. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  14. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  15. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...... parameters the ETX parameter is used in relation to the length of the shortest path. Proposed methods are independent of the media type and can be implemented either in wireless or PLC....

  16. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  17. On the Performance of the Current MANET Routing Protocols for VoIP, HTTP, and FTP Applications

    Directory of Open Access Journals (Sweden)

    Waheb A. Jabbar

    2014-01-01

    Full Text Available The recent advances of ensemble mobile environment of smart devices with embedded sensors have enabled the MANET to play a key role in the smart cities as well as WSN and WMN. However, these smart devices are still limited in terms of energy, processor, and memory. Moreover, the efficient routing for reliable network connectivity at anytime, anywhere, and about everything is still a challenge in multihop wireless networks. This paper evaluates the QoS and energy efficiency of three active routing protocols: (i OLSRv2, a successor to OLSR, (ii DYMO, a successor to both DSR and AODV, and (iii MP-OLSR multipath extension to OLSRv2. In contrast to the related previous works which focused only on CBR traffic without considering the influence of specific traffic types on the performance of routing protocols, this work focused on this area from a different perspective. It evaluates the performance of three internet-based traffic types that can be used in the smart city applications: VoIP, HTTP, and FTP using different simulation models. The impact of the network density, load traffic, and nodes mobility on the considered protocols was evaluated by considering particular performance metrics for each traffic application. Based on the results, the study concludes by presenting useful recommendations for future work.

  18. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  19. Protocol for Bone Augmentation with Simultaneous Early Implant Placement: A Retrospective Multicenter Clinical Study

    Directory of Open Access Journals (Sweden)

    Peter Fairbairn

    2015-01-01

    Full Text Available Purpose. To present a novel protocol for alveolar bone regeneration in parallel to early implant placement. Methods. 497 patients in need of extraction and early implant placement with simultaneous bone augmentation were treated in a period of 10 years. In all patients the same specific method was followed and grafting was performed utilizing in situ hardening fully resorbable alloplastic grafting materials consisting of β-tricalcium phosphate and calcium sulfate. The protocol involved atraumatic extraction, implant placement after 4 weeks with simultaneous bone augmentation, and loading of the implant 12 weeks after placement and grafting. Follow-up periods ranged from 6 months to 10 years (mean of 4 years. Results. A total of 601 postextraction sites were rehabilitated in 497 patients utilizing the novel protocol. Three implants failed before loading and three implants failed one year after loading, leaving an overall survival rate of 99.0%. Conclusions. This standardized protocol allows successful long-term functional results regarding alveolar bone regeneration and implant rehabilitation. The concept of placing the implant 4 weeks after extraction, augmenting the bone around the implant utilizing fully resorbable, biomechanically stable, alloplastic materials, and loading the implant at 12 weeks seems to offer advantages when compared with traditional treatment modalities.

  20. Fail-safe first wall for preclusion of little leakage

    International Nuclear Information System (INIS)

    Shibui, Masanao; Nakahira, Masataka; Tada, Eisuke; Takatsu, Hideyuki

    1994-05-01

    Leakages although excluded by design measures would occur most probably in highly stressed areas, weldments and locations without possibility to classify the state by in-service inspection. In a water-cooled first wall, allowable leak rate of water is generally very small, and therefore, locating of the leak portion under highly activated environment will be very difficult and be time-consuming. The double-wall concept is promising for the ITER first wall, because it can be made fail-safe by the application of the leak-before-break and the multiple load path concepts, and because it has a potential capability to solve the little leak problem. When the fail safe strength is well defined, subcritical crack growth in the damaged wall can be permitted. This will enable to detect stable leakage of coolant without deteriorating plasma operation. The paper deals with the little leak problem and presents method for evaluating small leak rate of a liquid coolant from crack-like defects. The fail-safe first wall with the double-wall concept is also proposed for preclusion of little leakage and its fail-safety is discussed. (author)

  1. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  2. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  3. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Directory of Open Access Journals (Sweden)

    Md. Golam Rashed

    2014-06-01

    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  4. Method for repairing failed fuel

    International Nuclear Information System (INIS)

    Shakudo, Taketomi.

    1986-01-01

    Purpose: To repair fuel elements that became failed during burnup in a reactor or during handling. Method: After the surface in the vicinity of a failed part of a fuel element is cleaned, a socket made of a shape-memory alloy having a ring form or a horseshoe form made by cutting a part of the ring form is inserted into the failed position according to the position of the failed fuel element. The shape memory alloy socket remembers a slightly larger inside diameter in its original phase (high-temperature side) than the outside diameter of the cladding tube and also a slightly larger inside diameter of the socket in the martensite phase (low-temperature side) than the outside diameter of the cladding tube, such that the socket can easily be inserted into the failed position. The socket, inserted into the failed part of the cladding tube, is heated by a heating jig. The socket recovers the original phase, and the shape also tends to recover a smaller diameter than the outside diameter of the cladding tube that has been remembered, and accordingly the failed part of the cladding tube is fastened with a great force and the failed part is fully closed with the socket, thus keeping radioactive materials from going out. (Horiuchi, T.)

  5. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  6. Minimal stimulation protocol using letrozole versus microdose flare up GnRH agonist protocol in women with poor ovarian response undergoing ICSI.

    Science.gov (United States)

    Mohsen, Iman Abdel; El Din, Rasha Ezz

    2013-02-01

    To compare the IVF outcomes of letrozole/antagonist and microdose GnRH agonist flare up protocols in poor ovarian responders undergoing intracytoplasmic sperm injection. A randomized controlled trial was performed in patients with one or more previous failed IVF cycles in which four or less oocytes were retrieved when the gonadotrophin starting dose was at least 300 IU/day. Sixty patients were randomized by computer-generated list to receive either letrozole/antagonist (mild stimulation) n = 30 or GnRH-a protocol (microdose flare) n = 30. Both groups were similar with respect to background and hormonal characteristics (age, duration of infertility, BMI, FSH, LH and E2). The clinical pregnancy rate per cycle was similar in both groups (13.3 vs. 16.6%; OR = 0.769; 95% CI = 0.185, 3.198). The doses of used gonadotropins and the number of stimulation days were significantly lower in the letrozole/antagonist protocol. The peak E2 level on the day of hCG, the endometrial thickness, the retrieved oocytes, the number of fertilized oocytes, the number of transferred embryos and the cancellation rate were statistically similar in both groups. The letrozole/antagonist protocol is a cost-effective and patient-friendly protocol that may be used in poor ovarian responders for IVF/ICSI.

  7. An Experimental Protocol for Assessing the Performance of New Ultrasound Probes Based on CMUT Technology in Application to Brain Imaging.

    Science.gov (United States)

    Matrone, Giulia; Ramalli, Alessandro; Savoia, Alessandro Stuart; Quaglia, Fabio; Castellazzi, Gloria; Morbini, Patrizia; Piastra, Marco

    2017-09-24

    The possibility to perform an early and repeatable assessment of imaging performance is fundamental in the design and development process of new ultrasound (US) probes. Particularly, a more realistic analysis with application-specific imaging targets can be extremely valuable to assess the expected performance of US probes in their potential clinical field of application. The experimental protocol presented in this work was purposely designed to provide an application-specific assessment procedure for newly-developed US probe prototypes based on Capacitive Micromachined Ultrasonic Transducer (CMUT) technology in relation to brain imaging. The protocol combines the use of a bovine brain fixed in formalin as the imaging target, which ensures both realism and repeatability of the described procedures, and of neuronavigation techniques borrowed from neurosurgery. The US probe is in fact connected to a motion tracking system which acquires position data and enables the superposition of US images to reference Magnetic Resonance (MR) images of the brain. This provides a means for human experts to perform a visual qualitative assessment of the US probe imaging performance and to compare acquisitions made with different probes. Moreover, the protocol relies on the use of a complete and open research and development system for US image acquisition, i.e. the Ultrasound Advanced Open Platform (ULA-OP) scanner. The manuscript describes in detail the instruments and procedures involved in the protocol, in particular for the calibration, image acquisition and registration of US and MR images. The obtained results prove the effectiveness of the overall protocol presented, which is entirely open (within the limits of the instrumentation involved), repeatable, and covers the entire set of acquisition and processing activities for US images.

  8. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  9. A protocol for better design, application, and communication of population viability analyses.

    Science.gov (United States)

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  10. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  11. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  12. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Science.gov (United States)

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  13. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  14. Engaging Future Failing States

    Science.gov (United States)

    2011-03-23

    military missions in the Middle East, the Balkans, Africa, Asia , and South America. There is an increasing proliferation of failed and failing states...disparity, overpopulation , food security, health services availability, migration pressures, environmental degradation, personal and 22 community

  15. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  16. High dose infusion of activated protein C (rhAPC) fails to improve neuronal damage and cognitive deficit after global cerebral ischemia in rats.

    Science.gov (United States)

    Brückner, Melanie; Lasarzik, Irina; Jahn-Eimermacher, Antje; Peetz, Dirk; Werner, Christian; Engelhard, Kristin; Thal, Serge C

    2013-09-13

    Recent studies demonstrated anticoagulatory, antiinflammatory, antiapoptotic, and neuroprotective properties of activated protein C (APC) in rodent models of acute neurodegenerative diseases, suggesting APC as promising broad acting therapeutic agent. Unfortunately, continuous infusion of recombinant human APC (rhAPC) failed to improve brain damage following cardiac arrest in rats. The present study was designed to investigate the neuroprotective effect after global cerebral ischemia (GI) with an optimized infusion protocol. Rats were subjected to bilateral clip occlusion of the common carotid arteries (BCAO) and controlled hemorrhagic hypotension to 40 mm Hg for 14 min and a subsequent 5h-infusion of rhAPC (2mg/kg bolus+6 mg/kg/h continuous IV) or vehicle (0.9% NaCl). The dosage was calculated to maintain plasma hAPC activity at 150%. Cerebral inflammation, apoptosis and neuronal survival was determined at day 10. rhAPC infusion did not influence cortical cerebral perfusion during reperfusion and failed to reduce neuronal cell loss, microglia activation, and caspase 3 activity. Even an optimized rhAPC infusion protocol designed to maintain a high level of APC plasma activity failed to improve the sequels following GI. Despite positive reports about protective effects of APC following, e.g., ischemic stroke, the present study supports the notion that infusion of APC during the early reperfusion phase does not result in sustained neuroprotection and fails to improve outcome after global cerebral ischemia. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  18. Modification of CAS-protocol for improvement of security web-applications from unauthorized access

    Directory of Open Access Journals (Sweden)

    Alexey I Igorevich Alexandrov

    2017-07-01

    Full Text Available Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data. The problem of setting up secure user identification is probably one of the most common tasks, which occur in the process of software development. Today, despite the availability of a large amount of authentication tools, new solutions, mechanisms and technologies are being introduced regularly. Primarily, it is done to increase the security level of data protection against unauthorized access. This article describes the experience of using central user authentication service based on CAS-protocol (CAS – Central Authentication Service and free open source software, analyzing its main advantages and disadvantages and describing the possibility of its modification, which would increase security of web-based information systems from being accessed illegally. The article contains recommendations for setting a maximum time limit for users working on services, integrated with central authentication; and, analyses the research of implementing modern web-technologies while using user authentication system based on CAS-protocol. In addition, it describes the ways of CAS-server modernization for developing additional modules: a module for collecting and analyzing the use of information systems, and another one, for a user management system. Furthermore, CAS-protocol can be used at universities and other organizations for creating a unified information environment in education.

  19. Acceptance testing in digital systens of mammography. Protocols applicability; Pruebas de aceptacion en equipos digitales de mamografia. Aplicabilidad de protocolos

    Energy Technology Data Exchange (ETDEWEB)

    Bermudez, R.; Espana, M.L.; Garcia Castanon, P.; Gomez Barrado, A.; Rodriguez Martin, G.; Fernandez Bedoya, B.

    2011-07-01

    Acceptance testing of mammographic imaging systems technical is the first approach in order to guarantee that mammograms will be achieved with the minimun radiation dose compatible with an image quality sutiable for diagnose purposes. The aim of this study is to assess the practical applicability of different protocols in acceptance test of digital mammographyc systems. This study has been carried out on the results of ltyhe acceptance tests of five flat panel digital mammographic systems. Parameters established in the systems technical specifications and those evaluated in the consulted protocols were tested. Due to the fact that the legislation oin our country does not demand to consider a specific protocol, the results obtained were also compared considering different existing protocols. Results show discrepancies between manufacturers limiting values and those established in the protocols. Some parameters, such as the authomatic exposure control compensation and the detector noise, were found out to meet or not the limiting value, depending on the selected protocol. From our results we could suggest, that protocols from manufacturers should be adapted to acknowledged documents on acceptance testing in digital mammography. They buyer representative could even specify the protocol to be followed during the acceptance tests. (Author). 25 refs.

  20. Acceptance testing in digital systems of mammography. Protocols applicability; Pruebas de aceptacion en equipos digitales de mamografia. Aplicabilidad de protocolos

    Energy Technology Data Exchange (ETDEWEB)

    Bermudez, R.; Espana, M.L.; Garcia Castanon, P.; Gomez Barrado, A.; Rodriguez Martin, G.; Fernandez Bedoya, B.

    2011-07-01

    Acceptance testing of mammographic imaging systems technical is the first approach in order to guarantee that mammograms will be achieved with the minimum radiation dose compatible with an image quality suitable for diagnose purposes. The aim of this study is to assess the practical applicability of different protocols in acceptance test of digital mammographic systems. This study has been carried out on the results of the acceptance tests of five flat panel digital mammographic systems. Parameters established in the systems technical specifications and those evaluated in the consulted protocols were tested. Due to the fact that the legislation in our country does not demand to consider a specific protocol, the results obtained were also compared considering different existing protocols. Results show discrepancies between manufacturers limiting values and those established in the protocols. Some parameters, such as the automatic exposure control compensation and the detector noise, were found out to meet or not the limiting value, depending on the selected protocol. From our results we could suggest, that protocols from manufacturers should be adapted to acknowledged documents on acceptance testing in digital mammography. They buyer representative could even specify the protocol to be followed during the acceptance tests. (Author). 25 refs.

  1. Audit protocol of compliance test on x-ray and interventional radiodiagnostic

    International Nuclear Information System (INIS)

    Endang Kunarsih; Fitria Sandra

    2011-01-01

    Testing protocol is a document that defined and implemented by the testing agency in conducting compliance testing to ensure that quality of testing implementation is planned and controlled in accordance with applicable regulations and standards. Testing protocol is required in filing an application to be a qualified testing agency. Auditors will review the testing protocol document to assess adequacy of the acceptance criteria before proceed to the next process. This paper presents the acceptance criteria required in an audit of the testing protocol document from the applicant of testing agency. (author)

  2. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  3. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  4. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  5. A Machine-to-Machine protocol benchmark for eHealth applications - Use case: Respiratory rehabilitation.

    Science.gov (United States)

    Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco

    2016-06-01

    M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  6. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  7. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  8. Dams designed to fail

    Energy Technology Data Exchange (ETDEWEB)

    Penman, A. [Geotechnical Engineering Consultants, Harpenden (United Kingdom)

    2004-09-01

    New developments in geotechnical engineering have led to methods for designing and constructing safe embankment dams. Failed dams can be categorized as those designed to fail, and those that have failed unexpectedly. This presentation outlined 3 dam failures: the 61 m high Malpasset Dam in France in 1959 which killed 421; the 71 m high Baldwin Hills Dam in the United States in 1963 which killed 5; and, the Vajont Dam in Italy in 1963 which killed 2,600 people. Following these incidents, the International Commission for Large Dams (ICOLD) reviewed regulations on reservoir safety. The 3 dams were found to have inadequate spillways and their failures were due to faults in their design. Fuse plug spillways, which address this problem, are designed to fail if an existing spillway proves inadequate. They allow additional discharge to prevent overtopping of the embankment dam. This solution can only be used if there is an adjacent valley to take the additional discharge. Examples of fuse gates were presented along with their effect on dam safety. A research program is currently underway in Norway in which high embankment dams are being studied for overtopping failure and failure due to internal erosion. Internal erosion has been the main reason why dams have failed unexpectedly. To prevent failures, designers suggested the use of a clay blanket placed under the upstream shoulder. However, for dams with soft clay cores, these underblankets could provide a route for a slip surface and that could lead to failure of the upstream shoulder. It was concluded that a safe arrangement for embankment dams includes the use of tipping gates or overturning gates which always fail at a required flood water level. Many have been installed in old and new dams around the world. 14 refs., 19 figs.

  9. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  10. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  11. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  12. Failed endotracheal intubation

    Directory of Open Access Journals (Sweden)

    Sheykhol Islami V

    1995-07-01

    Full Text Available The incidence of failed intubation is higher in obstetric than other surgical patients. Failed intubation was the 2nd commonest cause of mortality during anesthesia. Bearing in mind that failre to intubate may be unavoidable in certain circumstances, it is worth reviewing. The factors, which may contribute to a disastrous out come. Priorities of subsequent management must include maintaining oxygenation and preventing aspiration of gastric contents. Fiber optic intubation is now the technique of choice with a high success rate and with least trauma to the patient.

  13. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  14. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  15. Using the intervention mapping protocol to reduce European preschoolers’ sedentary behavior, an application to the ToyBox-Study

    Science.gov (United States)

    2014-01-01

    Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with

  16. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study.

    Science.gov (United States)

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-02-19

    High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The

  17. Protocols for atomistic modeling of water uptake into zeolite crystals for thermal storage and other applications

    International Nuclear Information System (INIS)

    Fasano, Matteo; Borri, Daniele; Chiavazzo, Eliodoro; Asinari, Pietro

    2016-01-01

    Highlights: • Numerical protocols for modeling water adsorption and infiltration into zeolite. • A priori screening of new materials for heat storage and desalination is possible. • Water uptake isotherms for bridging atomistic and engineering scales. - Abstract: We report numerical protocols for describing the water uptake process into microporous materials, with special emphasis on zeolite crystals. A better understanding and more predictive tools of the latter process are critical for a number of modern engineering applications, ranging from the optimization of loss free and compact thermal storage plants up to more efficient separation processes. Water sorption (and desorption) is indeed the key physical phenomenon to consider when designing several heat storage cycles, whereas water infiltration is to be studied when concerned with sieving through microporous materials for manufacturing selective membranes (e.g. water desalination by reverse osmosis). Despite the two quite different applications above, in this article we make an effort for illustrating a comprehensive numerical framework for predicting the engineering performances of microporous materials, based on detailed atomistic models. Thanks to the nowadays spectacular progresses in synthesizing an ever increasing number of new materials with desired properties such as zeolite with various concentrations of hydrophilic defects, we believe that the reported tools can possibly guide engineers in choosing and optimizing innovative materials for (thermal) engineering applications in the near future.

  18. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  19. CERN and the 10,000th application of the WorldFIP protocol

    CERN Multimedia

    2001-01-01

    On 24 April, CERN received an award for the 10,000th application of the WorldFIP industrial communication network protocol. The award was presented to Juan Antonio Rubio, Head of CERN's ETT Division, by Marc Desjardins, President of the WorldFIP association, which groups together 430 industrial partners with the aim of promoting the WorldFIP concept. Marc Desjardins, President of the WorldFIP association, presenting the award for the 10,000th application to CERN ETT Division Leader Juan Antonio Rubio. From left to right: Guy Baribaud (CERN), Ercole Gallacio (WF), Noël Fayard (WF), Gérard Demars (WF), Dario Fantoni (WF), Marc Desjardins (WF), Raymond Brun (CERN), Jean-Pierre Hauet (WF), Juan Antonio Rubio (CERN), Bernard Jouga (WF), Raymond Rausch (CERN), Jean-Pierre Froidevaux (WF), Marilena Streit-Bianchi (CERN), Michel Rabany (CERN), Patrick Chatelet (WF), Nicolas Cravoisy (WF), Jean Bergeal (WF). Communication networks, also known as fieldbuses, provide for digital comunication betwe...

  20. Where Words Fail, Music Speaks: A Mixed Method Study of an Evidence-Based Music Protocol.

    Science.gov (United States)

    Daniels, Ruby A; Torres, David; Reeser, Cathy

    2016-01-01

    Despite numerous studies documenting the benefits of music, hospice social workers are often unfamiliar with evidence-based music practices that may improve end of life care. This mixed method study tested an intervention to teach hospice social workers and chaplains (N = 10) an evidence-based music protocol. Participants used the evidence-based practice (EBP) for 30 days, recording 226 journal entries that described observations of 84 patients and their families. There was a significant increase in EBP knowledge (35%). Prompting behavioral and emotional responses, music was described frequently as a catalyst that facilitated deeper dialogue between patients, families, social workers, and chaplains.

  1. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    International Nuclear Information System (INIS)

    Xiao, Y.

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  2. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  3. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Y. [Thomas Jefferson University, Philadelphia, PA (United States)

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  4. Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications

    Directory of Open Access Journals (Sweden)

    Jehad Al Dallal

    2008-01-01

    Full Text Available Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC from a given service specification (S-SPEC. The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.

  5. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  6. Efficacy of pneumodilation in achalasia after failed Heller myotomy.

    Science.gov (United States)

    Saleh, C M G; Ponds, F A M; Schijven, M P; Smout, A J P M; Bredenoord, A J

    2016-11-01

    Heller myotomy is an effective treatment for the majority of achalasia patients. However, a small proportion of patients suffer from persistent or recurrent symptoms after surgery and they are usually subsequently treated with pneumodilation (PD). Data on the efficacy of PD as secondary treatment for achalasia are scarce. Therefore, this study aimed to investigate the efficacy of PD as treatment for achalasia patients suffering from persistent or recurrent symptoms after Heller myotomy. Patients with recurrent or persistent symptoms (Eckardt score >3) after Heller myotomy were selected. Patients were treated with PD, using a graded distension protocol with balloon sizes ranging from 30 to 40 mm. After each dilation symptoms were assessed to evaluate whether a subsequent dilation with a larger balloon size was required. Patients with recurrent or persistent symptoms (Eckardt score >3) after treatment with a 40-mm balloon were identified as failures. Twenty-four patients were included in total; 15 patients with achalasia type I, seven with achalasia type II and two with achalasia type III. Median relapse time was 2.5 years after Heller myotomy (IQR: 9 years and 3 months). Three patients were not suitable for PD; one patient was morbidly obese and not fit for any form of sedation and two had a siphon-shaped esophagus leaving 21 patients to treat. Eight patients were successfully treated with a single 30-mm balloon dilation (median follow-up time: 6.5 years; IQR: 7.5 years). Four patients required dilations with 30- and 35-mm balloons (median follow-up time: 11 years; IQR: 3 years). Nine patients failed on the 35-mm balloon dilation and underwent a subsequent dilation with a 40-mm balloon, and all failed on this balloon as well. Thus, PD was successful in 12 of the 21 treatable patients, resulting in a success rate of 57% for treatable patients or 50% for all patients. Baseline Eckardt scores were also higher in those that failed (median: 8; IQR: 2) than those that

  7. We still fail to account for Mendel's observations.

    Science.gov (United States)

    Porteous, John W

    2004-08-16

    The present article corrects common textbook accounts of Mendel's experiments by re-establishing what he wrote and how he accounted for his observations. It notes the long-established tests for the validity of any explanations that purport to explain observations obtained by experiment. Application of these tests to Mendel's paper shows that the arguments he used to explain his observations were internally consistent but were, on one crucial issue, implausible. The same tests are applied to the currently accepted explanation for Mendel's observations. The currently favoured explanation for Mendel's observations is untenable. It misrepresents Mendel, fails to distinguish between the parameters and the variables of any system of interacting components, its arguments are inconsistent, it repeats the implausibility in Mendel's paper, fails to give a rational explanation for his observed 3:1 trait ratio and cannot explain why this ratio is not always observed in experimental practice. A rational explanation for Mendel's observations is initiated. Readers are challenged to complete the process before a further article appears.

  8. FAILED FUEL DISPOSITION STUDY

    International Nuclear Information System (INIS)

    THIELGES, J.R.

    2004-01-01

    In May 2004 alpha contamination was found on the lid of the pre-filter housing in the Sodium Removal Ion Exchange System during routine filter change. Subsequent investigation determined that the alpha contamination likely came from a fuel pin(s) contained in an Ident-69 (ID-69) type pin storage container serial number 9 (ID-69-9) that was washed in the Sodium Removal System (SRS) in January 2004. Because all evidence indicated that the wash water interacted with the fuel, this ID49 is designated as containing a failed fuel pin with gross cladding defect and was set aside in the Interim Examination and Maintenance (IEM) Cell until it could be determined how to proceed for long term dry storage of the fuel pin container. This ID49 contained fuel pins from the driver fuel assembly (DFA) 16392, which was identified as a Delayed Neutron Monitor (DNM) leaker assembly. However, this DFA was disassembled and the fuel pin that was thought to be the failed pin was encapsulated and was not located in this ID49 container. This failed fuel disposition study discusses two alternatives that could be used to address long term storage for the contents of ID-69-9. The first alternative evaluated utilizes the current method of identifying and storing DNM leaker fuel pin(s) in tubes and thus, verifying that the alpha contamination found in the SRS came from a failed pin in this pin container. This approach will require unloading selected fuel pins from the ID-69, visually examining and possibly weighing suspect fuel pins to identify the failed pin(s), inserting the failed pin(s) in storage tubes, and reloading the fuel pins into ID49 containers. Safety analysis must be performed to revise the 200 Area Interim Storage Area (ISA) Final Safety Analysis Report (FSAR) (Reference 1) for this fuel configuration. The second alternative considered is to store the failed fuel as-is in the ID-69. This was evaluated to determine if this approach would comply with storage requirements. This

  9. FAILED FUEL DISPOSITION STUDY

    Energy Technology Data Exchange (ETDEWEB)

    THIELGES, J.R.

    2004-12-20

    In May 2004 alpha contamination was found on the lid of the pre-filter housing in the Sodium Removal Ion Exchange System during routine filter change. Subsequent investigation determined that the alpha contamination likely came from a fuel pin(s) contained in an Ident-69 (ID-69) type pin storage container serial number 9 (ID-69-9) that was washed in the Sodium Removal System (SRS) in January 2004. Because all evidence indicated that the wash water interacted with the fuel, this ID49 is designated as containing a failed fuel pin with gross cladding defect and was set aside in the Interim Examination and Maintenance (IEM) Cell until it could be determined how to proceed for long term dry storage of the fuel pin container. This ID49 contained fuel pins from the driver fuel assembly (DFA) 16392, which was identified as a Delayed Neutron Monitor (DNM) leaker assembly. However, this DFA was disassembled and the fuel pin that was thought to be the failed pin was encapsulated and was not located in this ID49 container. This failed fuel disposition study discusses two alternatives that could be used to address long term storage for the contents of ID-69-9. The first alternative evaluated utilizes the current method of identifying and storing DNM leaker fuel pin(s) in tubes and thus, verifying that the alpha contamination found in the SRS came from a failed pin in this pin container. This approach will require unloading selected fuel pins from the ID-69, visually examining and possibly weighing suspect fuel pins to identify the failed pin(s), inserting the failed pin(s) in storage tubes, and reloading the fuel pins into ID49 containers. Safety analysis must be performed to revise the 200 Area Interim Storage Area (ISA) Final Safety Analysis Report (FSAR) (Reference 1) for this fuel configuration. The second alternative considered is to store the failed fuel as-is in the ID-69. This was evaluated to determine if this approach would comply with storage requirements. This

  10. A universal data access and protocol integration mechanism for smart home

    Science.gov (United States)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  11. Evaluation of a protocol for the non-operative management of perforated peptic ulcer.

    Science.gov (United States)

    Marshall, C; Ramaswamy, P; Bergin, F G; Rosenberg, I L; Leaper, D J

    1999-01-01

    The non-operative management of perforated peptic ulcer has previously been shown to be both safe and effective although it remains controversial. A protocol for non-operative management was set up in this hospital in 1989. Adherence to the guidelines in the protocol has been audited over a 6-year period with a review of outcome. The case-notes of patients with a diagnosis of perforated peptic ulcer were reviewed. Twelve guidelines from the protocol were selected for evaluation of compliance to the protocol. Forty-nine patients underwent non-operative treatment initially. Eight patients failed to respond and underwent operation. Complications included abscess formation (seven patients), renal failure (one), gastric ileus (one), chest infection (two), and cardiac failure and stroke (one). Four deaths occurred in this group. Adherence to certain protocol guidelines was poor, notably those concerning prevention of thromboembolism, use of antibiotics, use of contrast examination to confirm the diagnosis and referral for follow-up endoscopy. Two gastric cancers were detected on subsequent endoscopy. This experience demonstrates that non-operative treatment can be used successfully in a general hospital. Adherence to protocol guidelines was found to be variable and the protocol has therefore been simplified. This study highlights the need for an accurate diagnosis and the importance of follow-up endoscopy.

  12. Protocol Additional to the Agreement between the People's Republic of China and the International Atomic Energy Agency for the Application of Safeguards in China

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of China and the International Atomic Energy Agency for the application of safeguards in China is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 31 December 1998. Pursuant to Article 10 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from China written notification that China's statutory and constitutional requirements for entry into force have been met, i.e. on 28 March 2002

  13. Critical thinking: are the ideals of OBE failing us or are we failing the ...

    African Journals Online (AJOL)

    Critical thinking: are the ideals of OBE failing us or are we failing the ideals of OBE? K Lombard, M Grosser. Abstract. No Abstract. South African Journal of Education Vol. 28 (4) 2008: pp. 561-580. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  14. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Signature, ratification, acceptance, approval or accession. Status as of 31 December 1996

    International Nuclear Information System (INIS)

    1997-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 31 December 1996. The Joint Protocol entered into force on 27 April 1992

  15. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Signature, ratification, acceptance, approval or accession. Status as of 31 December 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-28

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 31 December 1996. The Joint Protocol entered into force on 27 April 1992.

  16. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  17. [Peripheral vertigo versus central vertigo. Application of the HINTS protocol].

    Science.gov (United States)

    Batuecas-Caletrío, Ángel; Yáñez-González, Raquel; Sánchez-Blanco, Carmen; González-Sánchez, Enrique; Benito, José; Gómez, José Carlos; Santa Cruz-Ruiz, Santiago

    2014-10-16

    One of the most important dilemmas concerning vertigo in emergency departments is its differential diagnosis. There are highly sensitive warning signs in the examination that can put us on the path towards finding ourselves before a case of central vertigo. To determine how effective the application of the HINTS protocol is in the diagnosis of cerebrovascular accidents that mimics peripheral vertigo. We conducted a descriptive observation-based study on patients admitted to hospital with a diagnosis of acute vestibular syndrome in the emergency department. All the patients were monitored on a day-to-day basis until their symptoms improved, with information about nystagmus, the oculocephalic manoeuvre and the skew test. The results from the magnetic resonance imaging study were compared with the alteration of any of those three signs during the time the patient was hospitalised. Altogether 91 patients were examined, with a mean age of 55.8 years. A cerebrovascular accident was observed in eight cases. Of these (mean age: 71 years), in seven of them there were alterations in some of the HINTS signs, and in one case the study was normal (sensitivity: 0.88; specificity: 0.96). All of them had some vascular risk factor. Faced with a patient who visits the emergency department with an acute vestibular syndrome, a suitably directed examination is essential to be able to establish the differential diagnosis between peripheral and central pathology, since some cerebrovascular accidents can present with the appearance of acute vertigo. Applying a protocol like HINTS makes it possible to suspect the central pathology with a high degree of sensitivity and specificity.

  18. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  19. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  20. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  1. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  2. A Distributed Snapshot Protocol for Efficient Artificial Intelligence Computation in Cloud Computing Environments

    Directory of Open Access Journals (Sweden)

    JongBeom Lim

    2018-01-01

    Full Text Available Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applications and guarantee the service level agreement, cloud computing should provide not only computing resources but also fundamental mechanisms for efficient computing. In this regard, a snapshot protocol has been used to create a consistent snapshot of the global state in cloud computing environments. However, the existing snapshot protocols are not optimized in the context of artificial intelligence applications, where large-scale iterative computation is the norm. In this paper, we present a distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments. The proposed snapshot protocol is based on a distributed algorithm to run interconnected multiple nodes in a scalable fashion. Our snapshot protocol is able to deal with artificial intelligence applications, in which a large number of computing nodes are running. We reveal that our distributed snapshot protocol guarantees the correctness, safety, and liveness conditions.

  3. Fast Oblivious AES A Dedicated application of the MiniMac protocol

    DEFF Research Database (Denmark)

    Zakarias, Rasmus Winther; Damgård, Ivan Bjerre

    2015-01-01

    We present an actively secure multi-partycomputation of the Advanced Encryption Standard (AES). To the best of our knowledge it is the fastest of its kind to date. We start from an efficient actively secure evaluation of general binary circuits that was implemented by the authors of [DLT14......]. They presented an optimized implementation of the so-called MiniMac protocol [DZ13] that runs in the pre-processing model, and applied this to a binary AES circuit. In this paper we de- scribe how to dedicate the pre-processing to the structure of AES, which improves significantly the throughput and latency...... of previous actively secure implementations. We get a latency of about 6 ms and amortised time about 0.4 ms per AES block, which seems completely adequate for practical applications such as verification of 1-time passwords....

  4. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  5. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 12 September 2000. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    2000-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 12 September 2000. The Joint Protocol entered into force on 27 April 1992

  6. Joint Protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 30 September 2002. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    2002-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 30 September 2002. The Joint Protocol entered into force on 27 April 1992

  7. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  8. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  9. We still fail to account for Mendel's observations

    Directory of Open Access Journals (Sweden)

    Porteous John W

    2004-08-01

    Full Text Available Abstract Background The present article corrects common textbook accounts of Mendel's experiments by re-establishing what he wrote and how he accounted for his observations. It notes the long-established tests for the validity of any explanations that purport to explain observations obtained by experiment. Application of these tests to Mendel's paper shows that the arguments he used to explain his observations were internally consistent but were, on one crucial issue, implausible. The same tests are applied to the currently accepted explanation for Mendel's observations. Conclusions The currently favoured explanation for Mendel's observations is untenable. It misrepresents Mendel, fails to distinguish between the parameters and the variables of any system of interacting components, its arguments are inconsistent, it repeats the implausibility in Mendel's paper, fails to give a rational explanation for his observed 3:1 trait ratio and cannot explain why this ratio is not always observed in experimental practice. A rational explanation for Mendel's observations is initiated. Readers are challenged to complete the process before a further article appears.

  10. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  11. Though active on RINm5F insulinoma cells and cultured pancreatic islets, recombinant IL-22 fails to modulate cytotoxicity and disease in a protocol of streptozotocin-induced experimental diabetes.

    Directory of Open Access Journals (Sweden)

    Anika eBerner

    2016-01-01

    Full Text Available Interleukin (IL-22 is a cytokine displaying tissue protective and pro-regenerative functions in various preclinical disease models. Anti-bacterial, pro-proliferative, and anti-apoptotic properties mediated by activation of the transcription factor signal transducer and activator of transcription (STAT-3 are key to biological functions of this IL-10 family member. Herein, we introduce RINm5F insulinoma cells as rat ß-cell line that, under the influence of IL-22, displays activation of STAT3 with induction of its downstream gene targets Socs3, Bcl3, and Reg3ß. In addition, IL-22 also activates STAT1 in this cell type. To refine those observations, IL-22 biological activity was evaluated using ex vivo cultivated murine pancreatic islets. In accord with data on RINm5F cells, islet exposure to IL-22 activated STAT3 and upregulation of STAT3-inducible Socs3, Bcl3, and STEAP4 was evident under those conditions. As these observations supported the hypothesis that IL-22 may exert protective functions in toxic ß-cell injury, application of IL-22 was investigated in murine multiple-low-dose streptozotocin (STZ-induced diabetes. For that purpose, recombinant IL-22 was administered thrice either immediately before and at disease onset (at d4, d6, d8 or closely thereafter (at d8, d10, d12. These two IL-22-treatment periods coincide with two early peaks of ß-cell injury detectable in this model. Notably, none of the two IL-22-treatment strategies affected diabetes incidence or blood glucose levels in STZ-treated mice. Moreover, pathological changes in islet morphology analyzed 28 days after disease induction were not ameliorated by IL-22 administration. Taken together, despite being active on rat RINm5F insulinoma cells and murine pancreatic islets, recombinant IL-22 fails to protect pancreatic ß-cells in the tested protocols from toxic effects of STZ and thus is unable to ameliorate disease in the widely used model of STZ-induced diabetes.

  12. Failing Decision

    DEFF Research Database (Denmark)

    Knudsen, Morten

    2014-01-01

    Recently the Danish subway trains have begun to announce “on time” when they arrive at a station on time. This action reflects a worrying acceptance of the normality of failure. If trains were generally expected to be on time, there would be no reason to – triumphantly – announce it. This chapter...... by an interest in failure as one way of improving understanding of present-day decision making in organizations.......Recently the Danish subway trains have begun to announce “on time” when they arrive at a station on time. This action reflects a worrying acceptance of the normality of failure. If trains were generally expected to be on time, there would be no reason to – triumphantly – announce it. This chapter...... deals not with traffic delays, but with failing decisions in organizations. The assumption of this chapter is that failing decisions today are as normal as delayed trains. Instead of being the exception, failure is part of the everyday reproduction of organizations – as an uncontrolled effect but also...

  13. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  14. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  15. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Science.gov (United States)

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  16. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    Science.gov (United States)

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  17. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Directory of Open Access Journals (Sweden)

    Dixys L. Hernández-Rojas

    2017-12-01

    Full Text Available The Internet of Things (IoT involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons, LP4S-X (for more powerful beacons and LP4S-J (for beacons able to run complex firmware. In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6 is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format. Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  18. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  19. Application of Quantum Process Calculus to Higher Dimensional Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Simon J. Gay

    2014-07-01

    Full Text Available We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science. We have extended the quantum process calculus to describe d-dimensional quantum systems, which has not been done before. We summarise the necessary theory in the generalisation of quantum gates and Bell states and use the theory to apply the quantum process calculus CQP to quantum protocols, namely qudit teleportation and superdense coding.

  20. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  1. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    Science.gov (United States)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  2. Performance Analysis of Secure and Private Billing Protocols for Smart Metering

    Directory of Open Access Journals (Sweden)

    Tom Eccles

    2017-11-01

    Full Text Available Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting.

  3. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  4. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    OpenAIRE

    Hadeel Saleh Haj Aliwi; Putra Sumari

    2016-01-01

    Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call eve...

  5. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  6. Emergency gastroduodenal artery embolization by sandwich technique for angiographically obvious and oblivious, endotherapy failed bleeding duodenal ulcers

    Energy Technology Data Exchange (ETDEWEB)

    Anil, G., E-mail: ivyanil10@gmail.com [Department of Diagnostic Imaging, National University Hospital (Singapore); Department of Radiology, Changi General Hospital (Singapore); Tan, A.G.S.; Cheong, H.-W.; Ng, K.-S.; Teoh, W.-C. [Department of Radiology, Changi General Hospital (Singapore)

    2012-05-15

    Aim: To determine the feasibility, safety, and efficacy of adopting a standardized protocol for emergency transarterial embolization (TAE) of the gastroduodenal artery (GDA) with a uniform sandwich technique in endotherapy-failed bleeding duodenal ulcers (DU). Materials and methods: Between December 2009 and December 2010, 15 patients with endotherapy-failed bleeding DU were underwent embolization. Irrespective of active extravasation, the segment of the GDA supplying the bleeding DU as indicated by endoscopically placed clips was embolized by a uniform sandwich technique with gelfoam between metallic coils. The clinical profile of the patients, re-bleeding, mortality rates, and response time of the intervention radiology team were recorded. The angioembolizations were reviewed for their technical success, clinical success, and complications. Mean duration of follow-up was 266.5 days. Results: Active contrast-medium extravasation was seen in three patients (20%). Early re-bleeding was noted in two patients (13.33%). No patient required surgery. There was 100% technical success, while primary and secondary clinical success rates for TAE were 86.6 and 93.3%, respectively. Focal pancreatitis was the single major procedure-related complication. There was no direct bleeding-DU-related death. The response time of the IR service averaged 150 min (range 60-360 min) with mean value of 170 min. Conclusion: Emergency embolization of the GDA using the sandwich technique is a safe and highly effective therapeutic option for bleeding DUs refractory to endotherapy. A prompt response from the IR service can be ensured with an institutional protocol in place for such common medical emergencies.

  7. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  8. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    2005-04-01

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  9. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  10. Why did occidental modernity fail in the Arab Middle East: the failed modern state?

    OpenAIRE

    Sardar, Aziz

    2011-01-01

    This thesis asks a straightforward but nevertheless a complex question, that is: Why did modernity fail in the Arab Middle East? The notion of modernity in this thesis signifies the occidental modernity which reached the region in many different forms and through various channels. This occidental modernity had an impact on many areas and changed the societies and politics of the region. But these changes stopped short of reaching modernity, in other words it failed to change the society from ...

  11. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition); Guide d'application des garanties pour les Etats ayant des protocoles relatifs aux petites quantites de matieres

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-10-15

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  12. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  13. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  14. Therapeutic efficacy and toxicity of bolus application of chemotherapy protocol in the treatment of metastatic colorectal cancer.

    Science.gov (United States)

    Šišić, Ibrahim; Pojskić, Belma; Mekić Abazović, Alma; Kovčin, Vladimir

    2015-08-01

    To compare efficacy and toxicity of bolus application of chemotherapy protocol, oxaliplatin, fluorouracil (bolus), leucovorin (folfox) between two groups of patients in the therapy of metastatic colorectal carcinoma (mCRC). A total of 63 patients were treated for mCRC in the period January 2009 - January 2010 at the Department of Oncology of the Cantonal Hospital Zenica, Bosnia and Herzegovina (first group, 30 patients) and at the Department of Oncology of the Clinical Hospital Centre Bežanijska kosa in Belgrade, Serbia, in the period January 2005 - January 2006 (second group, 33 patients). The patients were treated according the same protocol, i.v. bolus infusion, but in different day intervals (D), 1, 8, 15/28 days or D1-D5/28 days, respectively. In all patients the following factors were analyzed: tumor response, overall survival (OS), progression free survival, hematological and non-hematological toxicity . Colon was the primary localization in almost two thirds of patients. There was no statistically significant difference between the groups according to the age, hematological and non-hematological toxicity, as well as in achieved OS. Progression free survival expressed in months was in average 5 months though with a large range between minimal and maximal survival time. Both groups have shown equivalent efficacy to applied chemotherapy protocols. Overall survival in the two groups matched data from the literature. Further research should confirm success of the combination of chemotherapy protocols and their combination with the biological therapy. Copyright© by the Medical Assotiation of Zenica-Doboj Canton.

  15. Therapeutic efficacy and toxicity of bolus application of chemotherapy protocol in the treatment of metastatic colorectal cancer

    Directory of Open Access Journals (Sweden)

    Ibrahim Šišić

    2015-08-01

    Full Text Available Aim To compare efficacy and toxicity of bolus application of chemotherapy protocol, oxaliplatin, fluorouracil (bolus, leucovorin (folfox between two groups of patients in the therapy of metastatic colorectal carcinoma (mCRC. Methods A total of 63 patients were treated for mCRC in the period January 2009 – January 2010 at the Department of Oncology of the Cantonal Hospital Zenica, Bosnia and Herzegovina (first group, 30 patients and at the Department of Oncology of the Clinical Hospital Centre Bežanijska kosa in Belgrade, Serbia, in the period January 2005 – January 2006 (second group, 33 patients. The patients were treated according the same protocol, i.v. bolus infusion, but in different day intervals (D, 1, 8, 15/28 days or D1-D5/28 days, respectively. In all patients the following factors were analyzed: tumor response, overall survival (OS, progression free survival, hematological and non-hematological toxicity. Results Colon was the primary localization in almost two thirds of patients. There was no statistically significant difference between the groups according to the age, hematological and non-hematological toxicity, as well as in achieved OS. Progression free survival expressed in months was in average 5 months though with a large range between minimal and maximal survival time. Conclusion Both groups have shown equivalent efficacy to applied chemotherapy protocols. Overall survival in the two groups matched data from the literature. Further research should confirm success of the combination of chemotherapy protocols and their combination with the biological therapy.

  16. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  17. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  18. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  19. Closed External Fixation for Failing or Failed Femoral Shaft Plating in a Developing Country.

    Science.gov (United States)

    Aliakbar, Adil; Witwit, Ibrahim; Al-Algawy, Alaa A Hussein

    2017-08-01

    Femoral shaft fractures are one of the common injuries that is treated by open reduction, with internal fixation by plate and screws or intramedullary nailing, which can achieve a high union rate. To evaluate the outcome of using closed external fixation to augment a failing plate; with signs of screw loosening and increasing bone/plate gap; a failed plate; broken plate; screws completely out of bone with redisplacement of fracture. A retrospective study on 18 patients, aged between 17-42 years, who presented between 6-18 weeks after initial surgical fixation, with pain, difficulty in limb function, deformity and abnormal movement at fracture site, was done. X-Rays showed plating failure with acceptable amount of callus, which unfortunately had refractured. Cases associated with infection and no radiological evidence of callus formation were excluded from this study. Closed reduction was done by manipulation, then fracture fixation by AO external fixator. The patients were encouraged for full weight bearing as early as possible with dynamization later on. Of the 18 patients who underwent external fixation after close reduction, 15 cases showed bone healing in a period between 11-18 weeks (mean of 14.27 weeks) with good alignment (Radiologically). Removal of external fixator was done followed by physical therapy thereafter. Closed external fixation for treatment of failing or failed femoral plating, achieves good success rate and has less complications, is a short time procedure, especially in a hospital with limited resources.

  20. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  1. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  2. Neglected City Narratives And Failed Rebranding

    DEFF Research Database (Denmark)

    Mousten, Birthe; Locmele, Gunta

    2017-01-01

    Rīga, Latvia went through a failed rebranding process as the forerunner of its status as a European Capital of Culture (2014). The same thing happened in Aarhus, Denmark. Aarhus will be a European Capital of Culture (2017) and leading to this, it went through a failed rebranding process. Based on...

  3. When Organization Fails: Why Authority Matters

    DEFF Research Database (Denmark)

    Blaschke, Steffen

    2015-01-01

    Review of: James R. Taylor and Elizabeth J. Van Every / When Organization Fails: Why Authority Matters. (New York: Routledge, 2014. 220 pp. ISBN: 978 0415741668)......Review of: James R. Taylor and Elizabeth J. Van Every / When Organization Fails: Why Authority Matters. (New York: Routledge, 2014. 220 pp. ISBN: 978 0415741668)...

  4. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  5. Bounding the per-protocol effect in randomized trials: An application to colorectal cancer screening

    NARCIS (Netherlands)

    S.A. Swanson (Sonja); Holme (Øyvind); M. Løberg (Magnus); M. Kalager (Mette); M. Bretthauer (Michael); G. Hoff (G.); E. Aas (Eline); M.A. Hernán (M.)

    2015-01-01

    textabstractBackground: The per-protocol effect is the effect that would have been observed in a randomized trial had everybody followed the protocol. Though obtaining a valid point estimate for the per-protocol effect requires assumptions that are unverifiable and often implausible, lower and upper

  6. Lahore general hospital protocol for treatment of neovascular glaucoma caused by retinal disease

    International Nuclear Information System (INIS)

    Khaqan, H.A.; Haider, S.A.

    2013-01-01

    To evaluate efficacy of LGH (Lahore General Hospital) protocol for treatment of neovascular glaucoma caused by retinal diseases. Material and Methods: This case series was performed on 9 consecutive eyes of nine patients with uncontrolled neovascular glaucoma at Department of Ophthalmology, Unit II, Lahore General Hospital/PGMI, Lahore. All nine patients completed six months follow up. Among them 6 patients were having PDR (proliferative diabetic retinopathy) and 3 patients having CRVO (central retinal vein occlusion). LGH protocol for treatment of neovascular glaucoma was: To give intravitreal injection of avastin and then PRP (Pan Retinal Photocoagulation) or Trabeculectomy with MMC (Mitomycin C), if PRP and intravitreal avastin fails to control the intra ocular-pressure (IOP). Results: Three patients had IOP control after intravitreal injection of avastin and PRP, 5 patients had uncontrolled IOP after intravitreal avastin and two sessions of PRP, so they under went trabeculectomy with MMC. One patient had uncontrolled IOP despite of full treatment protocol. All other 8 patients IOP remained stable for six months. Conclusion: Significant decrease in intraocular pressure was achieved after observing LGH protocol for treatment of NVG (Neovascular Glaucoma) caused by retinal diseases. (author)

  7. 7 CFR 983.52 - Failed lots/rework procedure.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Failed lots/rework procedure. 983.52 Section 983.52..., ARIZONA, AND NEW MEXICO Regulations § 983.52 Failed lots/rework procedure. (a) Substandard pistachios... committee may establish, with the Secretary's approval, appropriate rework procedures. (b) Failed lot...

  8. Definition and specification of "CANlike" protocols in the context of wireless networks

    OpenAIRE

    Juanole , Guy; Mouney , Gérard

    2015-01-01

    Rapport LAAS n° 15276; The implementation of distributed real-time applications on wireless networks constitutes today a new important challenge and, in this context, the MAC protocols, which implement the frame exchange scheduling, have an essential role. This paper is precisely concerned by the specification of such MAC protocols. We specify MAC protocols called CANlike protocols because they are inspired by the MAC protocol of the network CAN which is a wired network. The presentation made...

  9. Protocol for Quantification of Defects in Natural Fibres for Composites

    DEFF Research Database (Denmark)

    Mortensen, Ulrich Andreas; Madsen, Bo

    2014-01-01

    Natural bast-type plant fibres are attracting increasing interest for being used for structural composite applications where high quality fibres with good mechanical properties are required. A protocol for the quantification of defects in natural fibres is presented. The protocol is based...

  10. Should We Pursue Patients Who Fail to Attend Colorectal Clinics? A 9-Year Study

    Science.gov (United States)

    John, SKP; Jones, OM; Fay, H; Howell, RD; Fozard, JBJ

    2007-01-01

    INTRODUCTION No uniform protocol exists on how to deal with patients who fail to attend colorectal clinics. Our aim was to identify whether the tendency to ‘failure to attend’ (FTA) in the colorectal clinic was associated with FTA in other clinics and also whether FTA patients have serious pathology. PATIENTS AND METHODS This was a retrospective study of a prospectively recorded list of FTA patients, in colorectal urgent or two-week wait clinics from 1996–2004. RESULTS A total of 151 patients, who failed to attend their first appointment, were included in the study. Of these, 61 (40.4%) were colorectal referrals, 76 (50.3%) were general surgical referrals, and for 14 (9.3%) case notes were not available. There were 59 FTA episodes in 61 colorectal patients associated with 59 FTA episodes in other clinics (Pearson correlation: r = 0.411; P = 0.01, two-tailed, SPSS v.12). Of 58 colorectal outcomes, five (8.6%) colorectal cancers (CRC) were diagnosed, 23 (39.6%) were persistent non-attendees, 16 (27.5%) had benign colorectal pathology, two (3.4%) benign non-colorectal outcomes and 12 (20.6%) normal outcomes. CONCLUSIONS Tendency to FTA is habitual. Care needs to be exercised in the management of FTAs to avoid delayed presentation of colorectal cancer. PMID:17688719

  11. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  12. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  13. Creating Open Digital Library Using XML Implementation of OAi-PMH Protocol at CERN

    CERN Document Server

    Vesely, M; Le Meur, Jean-Yves; Simko, Tibor

    2002-01-01

    This article describes the implementation of the OAi-PMH protocol within the CERN Document Server (CDS). In terms of the protocol, CERN acts both as a data provider and service provider and the two core applications are described. The application of XML Schema and XSLT technology is emphasized.

  14. Creating Open Digital Library Using XML: Implementation of OAi-PMH Protocol at CERN

    OpenAIRE

    Vesely, M; Baron, T; Le Meur, Jean-Yves; Simko, Tibor

    2002-01-01

    This article describes the implementation of the OAi-PMH protocol within the CERN Document Server (CDS). In terms of the protocol, CERN acts both as a data provider and service provider and the two core applications are described. The application of XML Schema and XSLT technology is emphasized.

  15. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  16. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  17. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-02-09

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997.

  18. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  19. Application of an access technology delivery protocol to two children with cerebral palsy.

    Science.gov (United States)

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  20. Failed fuel detector

    International Nuclear Information System (INIS)

    Martucci, J.A.

    1975-01-01

    A failed fuel detection apparatus is described for a nuclear reactor having a liquid cooled core comprising a gas collection hood adapted to engage the top of the suspect assembly and means for delivering a stripping gas to the vicinity of the bottom of the suspect fuel assembly. (U.S.)

  1. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  2. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  3. Performances of different protocols for exocellular polysaccharides extraction from milk acid gels: Application to yogurt.

    Science.gov (United States)

    Nguyen, An Thi-Binh; Nigen, Michaël; Jimenez, Luciana; Ait-Abderrahim, Hassina; Marchesseau, Sylvie; Picart-Palmade, Laetitia

    2018-01-15

    Dextran or xanthan were used as model exocellular polysaccharides (EPS) to compare the extraction efficiency of EPS from skim milk acid gels using three different protocols. Extraction yields, residual protein concentrations and the macromolecular properties of extracted EPS were determined. For both model EPS, the highest extraction yield (∼80%) was obtained when samples were heated in acidic conditions at the first step of extraction (Protocol 1). Protocols that contained steps of acid/ethanol precipitation without heating (Protocols 2 and 3) show lower extraction yields (∼55%) but allow a better preservation of the EPS macromolecular properties. Changing the pH of acid gels up to 7 before extraction (Protocol 3) improved the extraction yield of anionic EPS without effect on the macromolecular properties of EPS. Protocol 1 was then applied for the quantification of EPS produced during the yogurt fermentation, while Protocol 3 was dedicated to their macromolecular characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Failed fuel detection method

    International Nuclear Information System (INIS)

    Utamura, Motoaki; Urata, Megumu.

    1976-01-01

    Object: To detect failed fuel element in a reactor with high precision by measuring the radioactivity concentrations for more than one nuclides of fission products ( 131 I and 132 I, for example) contained in each sample of coolant in fuel channel. Method: The radioactivity concentrations in the sampled coolant are obtained from gamma spectra measured by a pulse height analyser after suitable cooling periods according to the half-lives of the fission products to be measured. The first measurement for 132 I is made in two hours after sampling, and the second for 131 I is started one day after the sampling. Fuel element corresponding to the high radioactivity concentrations for both 131 I and 132 I is expected with certainty to have failed

  5. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  6. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  7. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  8. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  9. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  10. A Novel User Created Message Application Service Design for Bidirectional TPEG

    Science.gov (United States)

    Lee, Sang-Hee; Jo, Kang-Hyun

    The T-DMB (Terrestrial-Digital Multimedia Broadcasting) is the national service, currently successful in use in Korea since 2008. Among other services, TPEG (Transport Protocol Experts Group) service has been spotlighted in the aspects of creating earnings. At present, TPEG service is not so popular as it fails to satisfy the user’s demands on various aspects. Thus, the variety of services including bidirectional service is necessary in stage of DMB2.0. In this paper, the limitations of existing TPEG-POI (Point of Interest) application service using the wireless communication network are indicated. To overcome such limitations, we propose a business model for TPEG-UCM (User Created Message) application service which uses individual bidirectional media. The experiment shown in this paper proves the usability and operability of the proposed method, suggesting that the implementation of the proposed method would be overcome a lack of variety and unidirectional of existing TPEG application.

  11. Method of detecting a failed fuel

    International Nuclear Information System (INIS)

    Utamura, Motoaki; Urata, Megumi; Uchida, Shunsuke.

    1976-01-01

    Object: To improve detection accuracy of a failed fuel by eliminating a coolant temperature distribution in a fuel assembly. Structure: A failed fuel is detected from contents of nuclear fission products in a coolant by shutting off an upper portion of a fuel assembly provided in the coolant and by sampling the coolant in the fuel assembly. Temperature distribution in the fuel assembly is eliminated, by injecting the higher temperature coolant than that of the coolant inside and outside the fuel assembly when sampling, and thereby replacing the existing coolant in the fuel assembly for the higher temperature coolant. The failed fuel is detected from contents of the fission products existing in the coolant, by sampling the higher temperature coolant of the fuel assembly after a temperature passed. (Moriyama, K.)

  12. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  13. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  14. Failed fuel rod detector

    Energy Technology Data Exchange (ETDEWEB)

    Uchida, Katsuya; Matsuda, Yasuhiko

    1984-05-02

    The purpose of the project is to enable failed fuel rod detection simply with no requirement for dismantling the fuel assembly. A gamma-ray detection section is arranged so as to attend on the optional fuel rods in the fuel assembly. The fuel assembly is adapted such that a gamma-ray shielding plate is detachably inserted into optional gaps of the fuel rods or, alternatively, the fuel assembly can detachably be inserted to the gamma-ray shielding plate. In this way, amount of gaseous fission products accumulated in all of the plenum portions in the fuel rods as the object of the measurement can be determined without dismantling the fuel assembly. Accordingly, by comparing the amounts of the gaseous fission products, the failed fuel rod can be detected.

  15. Protocol for Validation of the Land Surface Reflectance Fundamental Climate Data Record using AERONET: Application to the Global MODIS and VIIRS Data Records

    Science.gov (United States)

    Roger, J. C.; Vermote, E.; Holben, B. N.

    2014-12-01

    The land surface reflectance is a fundamental climate data record at the basis of the derivation of other climate data records (Albedo, LAI/Fpar, Vegetation indices) and a key parameter in the understanding of the land-surface-climate processes. It is essential that a careful validation of its uncertainties is performed on a global and continuous basis. One approach is the direct comparison of this product with ground measurements but that approach presents several issues related to scale, the episodic nature of ground measurements and the global representativeness. An alternative is to compare the surface reflectance product to reference reflectance determined from Top of atmosphere reflectance corrected using accurate radiative transfer code and very detailed measurements of the atmosphere obtained over the AERONET sites (Vermote and al, 2014, RSE) which allows to test for a large range of aerosol characteristics; formers being important inputs for atmospheric corrections. However, the application of this method necessitates the definition of a very detailed protocol for the use of AERONET data especially as far as size distribution and absorption are concerned, so that alternative validation methods or protocols could be compared. This paper describes the protocol we have been working on based on our experience with the AERONET data and its application to the MODIS and VIIRS record.

  16. Assessment of the feasibility and coverage of a modified universal hearing screening protocol for use with newborn babies of migrant workers in Beijing.

    Science.gov (United States)

    Qi, Beier; Cheng, Xiaohua; En, Hui; Liu, Bo; Peng, Shichun; Zhen, Yong; Cai, Zhenghua; Huang, Lihui; Zhang, Luo; Han, Demin

    2013-08-08

    Although migrant workers account for the majority of newborns in Beijing, their children are less likely to undergo appropriate universal newborn hearing screening/rescreening (UNHS) than newborns of local non-migrant residents. We hypothesised that this was at least in part due to the inadequacy of the UNHS protocol currently employed for newborn babies, and therefore aimed to modify the protocol to specifically reflect the needs of the migrant population. A total of 10,983 healthy babies born to migrant mothers between January 2007 and December 2009 at a Beijing public hospital were investigated for hearing abnormalities according to a modified UNHS protocol. This incorporated two additional/optional otoacoustic emissions (OAE) tests at 24-48 hours and 2 months after birth. Infants not passing a screening test were referred to the next test, until any hearing loss was confirmed by the auditory brainstem response (ABR) test. A total of 98.91% (10983/11104) of all newborn children underwent the initial OAE test, of which 27.22% (2990/10983) failed the test. 1712 of the failed babies underwent the second inpatient OAE test, with739 failing again; thus significantly decreasing the overall positive rate for abnormal hearing from 27.22% to 18.36% ([2990-973 /10983)]; p = 0). Overall, 1147(56.87%) babies underwent the outpatient OAE test again after1-month, of whom 228 failed and were referred for the second outpatient OAE test (i.e. 2.08% (228/10983) referral rate at 1month of age). 141 of these infants underwent the referral test, of whom 103 (73.05%) tested positive again and were referred for a final ABR test for hearing loss (i.e. final referral rate of 1.73% ([228-38/10983] at 2 months of age). Only 54 infants attended the ABR test and 35 (0.32% of the original cohort tested) were diagnosed with abnormal hearing. Our study shows that it is feasible and practical to achieve high coverage rates for screening hearing loss and decrease the referral rates in

  17. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  18. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  19. Failed fuel diagnosis during WWER reactor operation using the RTOP-CA code

    International Nuclear Information System (INIS)

    Likhanskii, V.; Afanasieva, E.; Sorokin, A.; Evdokimov, I.; Kanukova, V.; Khromov, A.

    2006-01-01

    The mechanistic code RTOP-CA is developed for objectives of failed fuel diagnosis during WWER reactor operation. The RTOP-CA code enables to solve a direct problem: modelling the failed fuel behavior and prediction of primary coolant activity if characteristics of failures in the reactor core are known. Results of verification of the RTOP-CA code are presented. Separate physical models were verified on small-scale in-pile and out-of-pile experiments. Integral verification cases included data obtained at research reactors and at nuclear power plants. The RTOP-CA code is used for development of a neural-network approach to the inverse problem: detection of failure characteristics on the base of data on primary coolant activity during reactor operation. Preliminary results of application of the neural-network approach for evaluation of fuel failure characteristics are presented. (authors)

  20. The Operation of the Joint Protocol: Theoretical and Practical Implications Revisited

    International Nuclear Information System (INIS)

    Horbach, N.

    2008-01-01

    On 21 September 1988, a Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted and entered into force on 27 April 1992. The 1988 Joint Protocol (Article II) provides for a mutual extension of the operator's liability under the Paris and Vienna systems: thus, if a nuclear incident occurs for which an operator is liable under both the Vienna Convention and the Joint Protocol, he shall be liable in accordance with the Vienna Convention for nuclear damage suffered not only in the territory of Parties thereto, but also in the territory of Parties to both the Paris Convention and the Joint Protocol; conversely, if an incident occurs for which an operator is liable under both the Paris Convention and the Joint Protocol, there shall be reciprocity. Moreover, the Joint Protocol (Article III) eliminates conflicts of law which might otherwise arise, especially in transport cases, from simultaneous application of the two Conventions. Although the text of the Joint Protocol is quite straightforward, it still has led to different interpretations in legal doctrine concerning Article IV. The main concern is the conflict that might arise in respect of the appropriate designation of the competent court and applicable law in situations were courts of different states might claim exclusive jurisdiction. This depends also on whether the Joint Protocol should be interpreted as eliminating the distinction between Contracting Parties and non-Contracting Parties in respect of the 'functional' relations among Paris and Vienna Contracting Parties, also party to the Joint Protocol, as far as the operative provisions of both Conventions listed in Article IV are concerned (including the provisions on jurisdictional competence). The importance of finding the legally correct interpretation, already complicated in relation to the interpretation of the operation of the Joint Protocol under the unrevised nuclear liability treaties (1960 Paris

  1. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  2. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  3. Pass/fail patterns of candidates who failed COMLEX-USA level 2-PE because of misrepresentation of clinical findings on postencounter notes.

    Science.gov (United States)

    Langenau, Erik E; Sandella, Jeanne M

    2011-07-01

    In 2007, The National Board of Osteopathic Medical Examiners (NBOME) instituted a policy to address the accuracy and integrity of postencounter written documentation recorded during the Comprehensive Osteopathic Medical Licensing Examination Level 2-Performance Evaluation (COMLEX-USA Level 2-PE). This policy was instituted not only to protect the integrity of the examination, but also to highlight that overdocumentation of clinical findings not obtained during patient encounters may jeopardize patient safety. To investigate overall and domain pass/fail patterns of candidates who misrepresented clinical findings with regard to past and subsequent performance on COMLEX-USA Level 2-PE. Specifically, to investigate what percentage of candidates failed because of misrepresentation on first attempts and how they performed on subsequent administrations, as well as the previous performance patterns of candidates who failed because of misrepresentation on examination retakes. Historical records from NBOME's COMLEX-USA Level 2-PE database (testing cycles 2007-2008, 2008-2009, and 2009-2010) were used to analyze overall and domain pass/fail patterns of candidates who failed at least once because of misrepresentation of clinical findings. Of the 24 candidates who failed because of misrepresentation of postencounter (SOAP) notes, 20 candidates (83%) were first-time examinees. Four candidates (17%) were repeating the examination, 2 of whom were making a third attempt to pass. Among these 20 candidates who failed because of misrepresentation of clinical findings on their first attempt, 19 passed on their next attempt. At the time of study analysis, all but 2 candidates eventually passed the examination in subsequent attempts. Among candidates found to have misrepresented clinical findings on postencounter written documentation on COMLEX-USA Level 2-PE, no pattern existed between their past or subsequent performance with regard to overall or domain pass/fail results. The vast

  4. Log-binomial models: exploring failed convergence.

    Science.gov (United States)

    Williamson, Tyler; Eliasziw, Misha; Fick, Gordon Hilton

    2013-12-13

    Relative risk is a summary metric that is commonly used in epidemiological investigations. Increasingly, epidemiologists are using log-binomial models to study the impact of a set of predictor variables on a single binary outcome, as they naturally offer relative risks. However, standard statistical software may report failed convergence when attempting to fit log-binomial models in certain settings. The methods that have been proposed in the literature for dealing with failed convergence use approximate solutions to avoid the issue. This research looks directly at the log-likelihood function for the simplest log-binomial model where failed convergence has been observed, a model with a single linear predictor with three levels. The possible causes of failed convergence are explored and potential solutions are presented for some cases. Among the principal causes is a failure of the fitting algorithm to converge despite the log-likelihood function having a single finite maximum. Despite these limitations, log-binomial models are a viable option for epidemiologists wishing to describe the relationship between a set of predictors and a binary outcome where relative risk is the desired summary measure. Epidemiologists are encouraged to continue to use log-binomial models and advocate for improvements to the fitting algorithms to promote the widespread use of log-binomial models.

  5. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  6. Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

    Directory of Open Access Journals (Sweden)

    Majid Mumtaz

    2016-10-01

    Full Text Available Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509 certificates. The system uses Public Key Infrastructure (PKI, challenge/response protocol, mobile proxy servers, and Java cards with crypto capabilities used as a Secure Element. Innovative design of the protocol, its implementation, and evaluation results are described. In addition to end-user authentication, the described solution also supports the use of X.509 certificates for additional security services – confidentiality, integrity, and non-repudiation of transactions and data in an open network environment. The system uses Application Programming Interfaces (APIs to access Java cards functions and credentials that can be used as add-ons to enhance any mobile application with security features and services.

  7. Failed fuel detection device

    International Nuclear Information System (INIS)

    Sudo, Takayuki.

    1983-01-01

    Purpose: To enable early and sure detection of failed fuels by automatically changing the alarm set value depending on the operation states of a nuclear reactor. Constitution: Gaseous fission products released into coolants are transferred further into cover gases and then introduced through a pipeway to a failed fuel detector. The cover gases introduced from the pipeway to the pipeway or chamber within the detection device are detected by a radiation detector for the radiation dose of the gaseous fission products contained therein. The detected value is converted and amplified as a signal and inputted to a comparator. While on the other hand, a signal corresponding to the reactor power is converted by an alarm setter into a set value and inputted to the comparator. In such a structure, early and sure detection can be made for the fuel failures. (Yoshino, Y.)

  8. A VXI-GPIB protocol converter based on DSP

    International Nuclear Information System (INIS)

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  9. Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 11 June 1998. It was signed in Vienna on 12 June 1998

  10. Assessing impacts of roads: application of a standard assessment protocol

    Science.gov (United States)

    Duniway, Michael C.; Herrick, Jeffrey E.

    2013-01-01

    Adaptive management of road networks depends on timely data that accurately reflect the impacts those systems are having on ecosystem processes and associated services. In the absence of reliable data, land managers are left with little more than observations and perceptions to support management decisions of road-associated disturbances. Roads can negatively impact the soil, hydrologic, plant, and animal processes on which virtually all ecosystem services depend. The Interpreting Indicators of Rangeland Health (IIRH) protocol is a qualitative method that has been demonstrated to be effective in characterizing impacts of roads. The goal of this study were to develop, describe, and test an approach for using IIRH to systematically evaluate road impacts across large, diverse arid and semiarid landscapes. We developed a stratified random sampling approach to plot selection based on ecological potential, road inventory data, and image interpretation of road impacts. The test application on a semiarid landscape in southern New Mexico, United States, demonstrates that the approach developed is sensitive to road impacts across a broad range of ecological sites but that not all the types of stratification were useful. Ecological site and road inventory strata accounted for significant variability in the functioning of ecological processes but stratification based on apparent impact did not. Analysis of the repeatability of IIRH applied to road plots indicates that the method is repeatable but consensus evaluations based on multiple observers should be used to minimize risk of bias. Landscape-scale analysis of impacts by roads of contrasting designs (maintained dirt or gravel roads vs. non- or infrequently maintained roads) suggests that future travel management plans for the study area should consider concentrating traffic on fewer roads that are well designed and maintained. Application of the approach by land managers will likely provide important insights into

  11. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  12. A strategy and protocol to increase diffusion of energy related innovations into the mainstream of housing associations

    International Nuclear Information System (INIS)

    Egmond, C.; Jonkers, R.; Kok, G.

    2006-01-01

    To reduce human causes of global warming, large scale implementation of innovative products that save energy is necessary. Innovative products first reach the early market actors who are driven by a visionary attitude. Hereafter, the products must reach the much larger mainstream market whose actors are driven by a pragmatic attitude. Many innovations, however, only appeal to the visionary early market and do not meet the more pragmatic needs of the mainstream. For that reason, innovations often fall in a 'chasm' between the early market and the mainstream and fail to reach the mainstream. We developed a strategy and a protocol to aid governmental agencies in influencing the mainstream members of housing associations to adopt energy conservation innovations. Our method is an adaptation of an existing marketing method and applicable to other target groups. The first step in crossing this chasm is to find a niche segment in the mainstream as the starting point for winning the rest of the mainstream. By surveying the target group and analyzing the data, we identified 29 housing associations (234 interviewed) that belong to this niche segment. Identifying the niche segment and its determinants of behaviour is part of our 4-step protocol that leads to adapting the innovative product to meet the needs of the niche and setting up a marketing plan to win the rest of the mainstream

  13. Comparison of luteal estradiol patch and gonadotropin-releasing hormone antagonist suppression protocol before gonadotropin stimulation versus microdose gonadotropin-releasing hormone agonist protocol for patients with a history of poor in vitro fertilization outcomes.

    Science.gov (United States)

    Weitzman, Vanessa N; Engmann, Lawrence; DiLuigi, Andrea; Maier, Donald; Nulsen, John; Benadiva, Claudio

    2009-07-01

    To compare IVF outcomes in poor-responder patients undergoing stimulation after luteal phase E(2) patch/GnRH antagonist (LPG) protocol versus microdose GnRH agonist protocol. Retrospective analysis. University-based IVF center. Forty-five women undergoing ovarian stimulation for IVF using the LPG protocol were compared with 76 women stimulated with the microdose GnRH agonist protocol from May 2005 to April 2006. Cancellation rate, number of oocytes retrieved, and clinical pregnancy rates. The mean number of oocytes (9.1 +/- 4.1 vs. 8.9 +/- 4.3) and mature oocytes (6.7 +/- 3.5 vs. 6.8 +/- 3.1) retrieved were similar, as were the fertilization rates (70.0% +/- 24.2% vs. 69.9% +/- 21.5%) and the number of embryos transferred (2.5 +/- 1.1 vs. 2.7 +/- 1.3). The cancellation rate was not significantly different between the groups (13/45, 28.9% vs. 23/76, 30.3%). Likewise, there were no significant differences among the implantation rate (15.0% vs. 12.5%), clinical pregnancy rate (43.3% vs. 45.1%), and ongoing pregnancy rate per transfer (33.3% vs. 26.0%) between both groups. This study demonstrates that the use of an E(2) patch and a GnRH antagonist during the preceding luteal phase in patients with a history of failed cycles can provide similar IVF outcomes when compared with the microdose GnRH agonist protocol.

  14. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  15. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  16. The failing firm defence: merger policy and entry

    OpenAIRE

    Mason, Robin; Weeds, Helen

    2003-01-01

    This Paper considers the 'failing firm defence'. Under this principle, found in most antitrust jurisdictions, a merger that would otherwise be blocked due to its adverse effect on competition is permitted when the firm to be acquired is a failing firm, and an alternative, less detrimental merger is unavailable. Competition authorities have shown considerable reluctance to accept the failing firm defence, and it has been successfully used in just a handful of cases. The Paper considers the def...

  17. Coping Styles of Failing Brunei Vocational Students

    Science.gov (United States)

    Mundia, Lawrence; Salleh, Sallimah

    2017-01-01

    Purpose: The purpose of this paper is to determine the prevalence of two types of underachieving students (n = 246) (active failing (AF) and passive failing (PF)) in Brunei vocational and technical education (VTE) institutions and their patterns of coping. Design/methodology/approach: The field survey method was used to directly reach many…

  18. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  19. Considerations preliminary to the application of early and immediate loading protocols in dental implantology.

    Science.gov (United States)

    Szmukler-Moncler, S; Piattelli, A; Favero, G A; Dubruille, J H

    2000-02-01

    In oral implantology, a 3-6 month stress-free healing period is presently accepted as a prerequisite to achieve bone apposition without interposition of a fibrous scar tissue. This protocol was introduced by Brånemark and co-workers in 1977. The aim of the present paper is to review the reasons that led Brånemark and collaborators to require long delayed loading periods. It is shown that the requirement for long delayed loading periods was drawn from the initiation and development periods of their original clinical trial. Demanding conditions were met involving simultaneously: 1) patients with poor bone quality and quantity, 2) non-optimized implant design, 3) short implants, 4) non-optimized surgical placement, 5) non-optimized surgical protocol and 6) biomechanically non-optimized prosthesis. Extrapolation of the requirement for long healing periods from these particular conditions to more standard situations involving refined surgical protocols and careful patient selection might be questioned. Albeit premature loading has been interpreted as inducing fibrous tissue interposition, immediate loading per se is not responsible for fibrous encapsulation. It is the excess of micromotion during the healing phase that interferes with bone repair. A threshold of tolerated micromotion exists, that is somewhere between 50 microns and 150 microns. It is suggested that loading protocols might be shortened through 2 different approaches. The first way would be to decrease stepwise the delayed loading period for free-standing implants below the presently accepted 3-6 months of healing. The second way would be to identify immediate loading protocols that are capable of keeping the amount of micromotion beneath the threshold of deleterious micromotion. Immediate loading protocols for implants-retained overdentures and fixed bridges are reviewed. It is shown that successful premature loading protocols require a careful and strict patient selection aimed to achieve the best

  20. An optimised protocol for molecular identification of Eimeria from chickens☆

    Science.gov (United States)

    Kumar, Saroj; Garg, Rajat; Moftah, Abdalgader; Clark, Emily L.; Macdonald, Sarah E.; Chaudhry, Abdul S.; Sparagano, Olivier; Banerjee, Partha S.; Kundu, Krishnendu; Tomley, Fiona M.; Blake, Damer P.

    2014-01-01

    Molecular approaches supporting identification of Eimeria parasites infecting chickens have been available for more than 20 years, although they have largely failed to replace traditional measures such as microscopy and pathology. Limitations of microscopy-led diagnostics, including a requirement for specialist parasitological expertise and low sample throughput, are yet to be outweighed by the difficulties associated with accessing genomic DNA from environmental Eimeria samples. A key step towards the use of Eimeria species-specific PCR as a sensitive and reproducible discriminatory tool for use in the field is the production of a standardised protocol that includes sample collection and DNA template preparation, as well as primer selection from the numerous PCR assays now published. Such a protocol will facilitate development of valuable epidemiological datasets which may be easily compared between studies and laboratories. The outcome of an optimisation process undertaken in laboratories in India and the UK is described here, identifying four steps. First, samples were collected into a 2% (w/v) potassium dichromate solution. Second, oocysts were enriched by flotation in saturated saline. Third, genomic DNA was extracted using a QIAamp DNA Stool mini kit protocol including a mechanical homogenisation step. Finally, nested PCR was carried out using previously published primers targeting the internal transcribed spacer region 1 (ITS-1). Alternative methods tested included sample processing in the presence of faecal material, DNA extraction using a traditional phenol/chloroform protocol, the use of SCAR multiplex PCR (one tube and two tube versions) and speciation using the morphometric tool COCCIMORPH for the first time with field samples. PMID:24138724

  1. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  2. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  3. Restoring Low Sidelobe Antenna Patterns with Failed Elements in a Phased Array Antenna

    Science.gov (United States)

    2016-02-01

    optimum low sidelobes are demonstrated in several examples. Index Terms — Array signal processing, beams, linear algebra , phased arrays, shaped...beam antennas. I. INTRODUCTION For many phased array antenna applications , low spatial sidelobes are required, and it is desirable to maintain...represented by a linear combination of low sidelobe beamformers with no failed elements, ’s, in a neighborhood around under the constraint that the linear

  4. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  5. The Design of Finite State Machine for Asynchronous Replication Protocol

    Science.gov (United States)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  6. Ontology-based configuration of problem-solving methods and generation of knowledge-acquisition tools: application of PROTEGE-II to protocol-based decision support.

    Science.gov (United States)

    Tu, S W; Eriksson, H; Gennari, J H; Shahar, Y; Musen, M A

    1995-06-01

    PROTEGE-II is a suite of tools and a methodology for building knowledge-based systems and domain-specific knowledge-acquisition tools. In this paper, we show how PROTEGE-II can be applied to the task of providing protocol-based decision support in the domain of treating HIV-infected patients. To apply PROTEGE-II, (1) we construct a decomposable problem-solving method called episodic skeletal-plan refinement, (2) we build an application ontology that consists of the terms and relations in the domain, and of method-specific distinctions not already captured in the domain terms, and (3) we specify mapping relations that link terms from the application ontology to the domain-independent terms used in the problem-solving method. From the application ontology, we automatically generate a domain-specific knowledge-acquisition tool that is custom-tailored for the application. The knowledge-acquisition tool is used for the creation and maintenance of domain knowledge used by the problem-solving method. The general goal of the PROTEGE-II approach is to produce systems and components that are reusable and easily maintained. This is the rationale for constructing ontologies and problem-solving methods that can be composed from a set of smaller-grained methods and mechanisms. This is also why we tightly couple the knowledge-acquisition tools to the application ontology that specifies the domain terms used in the problem-solving systems. Although our evaluation is still preliminary, for the application task of providing protocol-based decision support, we show that these goals of reusability and easy maintenance can be achieved. We discuss design decisions and the tradeoffs that have to be made in the development of the system.

  7. New protocol of clomiphene citrate treatment in women with hypothalamic amenorrhea.

    Science.gov (United States)

    Borges, Lavinia Estrela; Morgante, Giuseppe; Musacchio, Maria Concetta; Petraglia, Felice; De Leo, Vincenzo

    2007-06-01

    To determine if a new protocol of administration of clomiphene citrate (CC) is effective in menstrual cycle recovery in women with hypothalamic secondary amenorrhea. This was an open-label study. Patients comprised a group of eight women with secondary amenorrhea. Interventions. An oral preparation containing CC (50 mg/day) was administered for 5 days followed by a double dose (100 mg/day) for another 5 days, initiated on day 3 after estrogen/progestogen-induced withdrawal bleeding. If ovulation and vaginal bleeding occurred, treatment continued in the two next months with 100 mg/day from day 3 to day 7 day of the cycle. Cycle control was evaluated at each visit, when patients recorded bleeding patterns and tablet intake. Data on the intensity and duration of bleeding were collected. Six patients responded to the first cycle of CC administration, resuming normal menstrual cycles. The other two patients failed to menstruate after the first 10 days of treatment with CC and repeated the same protocol. After the second administration, these two women also had normal menstrual bleeding. The present data show that this new protocol of CC treatment may be useful to restore normal menstrual cycles in young women with hypothalamic amenorrhea.

  8. Salvage of Failed Protein Targets by Reductive Alkylation

    Science.gov (United States)

    Tan, Kemin; Kim, Youngchang; Hatzos-Skintges, Catherine; Chang, Changsoo; Cuff, Marianne; Chhor, Gekleng; Osipiuk, Jerzy; Michalska, Karolina; Nocek, Boguslaw; An, Hao; Babnigg, Gyorgy; Bigelow, Lance; Joachimiak, Grazyna; Li, Hui; Mack, Jamey; Makowska-Grzyska, Magdalena; Maltseva, Natalia; Mulligan, Rory; Tesar, Christine; Zhou, Min; Joachimiak, Andrzej

    2014-01-01

    The growth of diffraction-quality single crystals is of primary importance in protein X-ray crystallography. Chemical modification of proteins can alter their surface properties and crystallization behavior. The Midwest Center for Structural Genomics (MCSG) has previously reported how reductive methylation of lysine residues in proteins can improve crystallization of unique proteins that initially failed to produce diffraction-quality crystals. Recently, this approach has been expanded to include ethylation and isopropylation in the MCSG protein crystallization pipeline. Applying standard methods, 180 unique proteins were alkylated and screened using standard crystallization procedures. Crystal structures of 12 new proteins were determined, including the first ethylated and the first isopropylated protein structures. In a few cases, the structures of native and methylated or ethylated states were obtained and the impact of reductive alkylation of lysine residues was assessed. Reductive methylation tends to be more efficient and produces the most alkylated protein structures. Structures of methylated proteins typically have higher resolution limits. A number of well-ordered alkylated lysine residues have been identified, which make both intermolecular and intramolecular contacts. The previous report is updated and complemented with the following new data; a description of a detailed alkylation protocol with results, structural features, and roles of alkylated lysine residues in protein crystals. These contribute to improved crystallization properties of some proteins. PMID:24590719

  9. Salvage of failed protein targets by reductive alkylation.

    Science.gov (United States)

    Tan, Kemin; Kim, Youngchang; Hatzos-Skintges, Catherine; Chang, Changsoo; Cuff, Marianne; Chhor, Gekleng; Osipiuk, Jerzy; Michalska, Karolina; Nocek, Boguslaw; An, Hao; Babnigg, Gyorgy; Bigelow, Lance; Joachimiak, Grazyna; Li, Hui; Mack, Jamey; Makowska-Grzyska, Magdalena; Maltseva, Natalia; Mulligan, Rory; Tesar, Christine; Zhou, Min; Joachimiak, Andrzej

    2014-01-01

    The growth of diffraction-quality single crystals is of primary importance in protein X-ray crystallography. Chemical modification of proteins can alter their surface properties and crystallization behavior. The Midwest Center for Structural Genomics (MCSG) has previously reported how reductive methylation of lysine residues in proteins can improve crystallization of unique proteins that initially failed to produce diffraction-quality crystals. Recently, this approach has been expanded to include ethylation and isopropylation in the MCSG protein crystallization pipeline. Applying standard methods, 180 unique proteins were alkylated and screened using standard crystallization procedures. Crystal structures of 12 new proteins were determined, including the first ethylated and the first isopropylated protein structures. In a few cases, the structures of native and methylated or ethylated states were obtained and the impact of reductive alkylation of lysine residues was assessed. Reductive methylation tends to be more efficient and produces the most alkylated protein structures. Structures of methylated proteins typically have higher resolution limits. A number of well-ordered alkylated lysine residues have been identified, which make both intermolecular and intramolecular contacts. The previous report is updated and complemented with the following new data; a description of a detailed alkylation protocol with results, structural features, and roles of alkylated lysine residues in protein crystals. These contribute to improved crystallization properties of some proteins.

  10. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  11. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  12. Bell nonlocality: a resource for device-independent quantum information protocols

    Science.gov (United States)

    Acin, Antonio

    2015-05-01

    Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.

  13. A Protocol for Advanced Psychometric Assessment of Surveys

    Science.gov (United States)

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  14. Model-Checking Web Services Business Activity Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2013-01-01

    Web Services Business Activity specification defines two coordination protocols BAwCC (Business Agreement with Coordination Completion) and BAwPC (Business Agreement with Participant Completion)that ensure a consistent agreement on the outcome of long-running distributed applications. In order...

  15. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  16. Thoraco-abdominal high-pitch dual-source CT angiography: Experimental evaluation of injection protocols with an anatomical human vascular phantom

    Energy Technology Data Exchange (ETDEWEB)

    Puippe, Gilbert D., E-mail: gilbert.puippe@usz.ch [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Winklehner, Anna [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Hasenclever, Peter; Plass, André [Division of Cardiac and Vascular Surgery, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Frauenfelder, Thomas; Baumueller, Stephan [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland)

    2012-10-15

    Objective: To experimentally evaluate three different contrast injection protocols at thoraco-abdominal high-pitch dual-source computed tomography angiography (CTA), with regard to level and homogeneity of vascular enhancement at different cardiac outputs. Materials and methods: A uniphasic, a biphasic as well as an individually tailored contrast protocol were tested using a human vascular phantom. Each protocol was scanned at 5 different cardiac outputs (3–5 L/min, steps of 0.5 L/min) using an extracorporeal cardiac pump. Vascular enhancement of the thoraco-abdominal aorta was measured every 5 cm. Overall mean enhancement of each protocol and mean enhancement for each cardiac output within each protocol were calculated. Enhancement homogeneity along the z-axis was evaluated for each cardiac output and protocol. Results: Overall mean enhancement was significantly higher in the uniphasic than in the other two protocols (all p < .05), whereas the difference between the biphasic and tailored protocol was not significant (p = .76). Mean enhancement among each of the 5 cardiac outputs within each protocol was significantly different (all p < .05). Only within the tailored protocol mean enhancement differed not significantly at cardiac outputs of 3.5 L/min vs. 5 L/min (484 ± 25 HU vs. 476 ± 19 HU, p = .14) and 4 vs. 5 L/min (443 ± 49 HU vs. 476 ± 19 HU, p = .05). Both, uniphasic and tailored protocol yielded homogenous enhancement at all cardiac outputs, whereas the biphasic protocol failed to achieve homogenous enhancement. Conclusion: This phantom study suggests that diagnostic and homogenous enhancement at thoraco-abdominal high-pitch dual-source CTA is feasible with either a uniphasic or an individually tailored contrast protocol.

  17. A review of tags anti-collision and localization protocols in RFID networks.

    Science.gov (United States)

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  18. Who Really Failed? Commentary

    Science.gov (United States)

    Maiuri, Katherine M.; Leon, Raul A.

    2012-01-01

    Scott Jaschik's (2010) article "Who Really Failed?" details the experience of Dominique Homberger, a tenured faculty member at Louisiana State University (LSU) who was removed from teaching her introductory biology course citing student complaints in regards to "the extreme nature" of the grading policy. This removal has…

  19. Abortion: Strong's counterexamples fail

    DEFF Research Database (Denmark)

    Di Nucci, Ezio

    2009-01-01

    This paper shows that the counterexamples proposed by Strong in 2008 in the Journal of Medical Ethics to Marquis's argument against abortion fail. Strong's basic idea is that there are cases--for example, terminally ill patients--where killing an adult human being is prima facie seriously morally...

  20. Protocol Additional to the agreement between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Canada written notification that Canada's statutory and/or constitutional requirements for entry into force have been met, i.e. on 8 September 2000

  1. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  2. MRI in 'failed back surgery syndrome': Comparison to computed tomography

    International Nuclear Information System (INIS)

    Trattnig, S.; Ungersboeck, K.; Cech, T.; Schindler, E.

    1990-01-01

    The term 'failed back surgery syndrome' (FBSS) includes a variety of clinical-neurological symptoms following disc surgery. In a prospective study 18 patients suffering from monoradicular symptoms after disc surgery were examined by MRI and CT (both prior to and following intravenous application of contrast material). Findings were then compared to microsurgery. MRI produced correct diagnoses in 17 cases, CT in 13 cases. Recurrent disc herniation caused symptoms four times, and epidural scar formation twice. In twelve cases there was herniated disc material as well as an epidural scar present; disc material preponderated nine times, scar formation in three instances. (orig.) [de

  3. Protocol for uniformly measuring and expressing the performance of energy storage systems.

    Energy Technology Data Exchange (ETDEWEB)

    Ferreira, Summer Kamal Rhodes; Rose, David Martin; Schoenwald, David A; Bray, Kathy; Conover, David; Kintner-Meyer, Michael; Viswanathan, Vilayanur

    2013-08-01

    The U.S. Department of Energys Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of ESSs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs to make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  4. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bray, Kathryn L.; Conover, David R.; Kintner-Meyer, Michael CW; Viswanathan, Vijayganesh; Ferreira, Summer; Rose, David; Schoenwald, David

    2012-10-01

    The U.S. Department of Energy’s Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of EESs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  5. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  6. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    present for a specific study phase may have been masked by combining protocols into phase groupings. Presence of informative censoring, such as withdrawal of some protocols from development if they began showing signs of lost interest among investigators, complicates interpretation of Kaplan-Meier estimates. Because this study constitutes a retrospective examination over an extended period of time, it does not allow for the precise identification of relative factors impacting timing. Conclusions Delays not only increase the time and cost to complete clinical trials, but they also diminish their usefulness by failing to answer research questions in time. We believe that research analyzing the time spent traversing defined intervals across the clinical trial protocol development and implementation continuum can stimulate business process analyses and reengineering efforts that could lead to reductions in the time from clinical trial concept to results, thereby accelerating progress in clinical research. PMID:24980279

  7. Some methods of failed fuel element detection in water cooled reactors

    International Nuclear Information System (INIS)

    Strindehag, O.M.

    1976-01-01

    The methods are surveyed using fission products released in the coolant for the detection of failed fuel elements in water cooled reactors. The classification of the detection methods is made with respect to fission product detection in the coolant and to gaseous fission product detection. The detection systems are listed used for the AGESTA power reactor and for the experimental loops of the RA research reactor based on the detection of either gaseous fission products or gaseous daughter products. The AGESTA reactor detection systems using electrostatic precipitators consist of five precipitator channels of which three are intended for detection and two for localization. A special detection unit was developed for the failed fuel element detection in the R-2 reactor experimental steam loop. Its description is listed. In the reactor pressurized-water loop a Cherenkov counter was used in the detection of fission products. An ion exchange monitor whose application is described was used in the total measurement of the main coolant flow in the AGESTA reactor. (J.P.)

  8. Remotely-Supervised Transcranial Direct Current Stimulation (tDCS for Clinical Trials: Guidelines for Technology and Protocols

    Directory of Open Access Journals (Sweden)

    Leigh E Charvet

    2015-03-01

    Full Text Available The effect of transcranial direct current stimulation (tDCS is cumulative. Treatment protocols typically require multiple consecutive sessions spanning weeks or months. However, traveling to clinic for a tDCS session can present an obstacle to subjects and their caregivers. With modified devices and headgear, tDCS treatment can be administered remotely under clinical supervision, potentially enhancing recruitment, throughput, and convenience. Here we propose standards and protocols for clinical trials utilizing remotely-supervised tDCS with the goal of providing safe, reproducible and well-tolerated stimulation therapy outside of the clinic. The recommendations include: 1 training of staff in tDCS treatment and supervision, 2 assessment of the user’s capability to participate in tDCS remotely, 3 ongoing training procedures and materials including assessments of the user and/or caregiver, 4 simple and fail-safe electrode preparation techniques and tDCS headgear, 5 strict dose control for each session, 6 ongoing monitoring to quantify compliance (device preparation, electrode saturation/placement, stimulation protocol, with corresponding corrective steps as required, 7 monitoring for treatment-emergent adverse effects, 8 guidelines for discontinuation of a session and/or study participation including emergency failsafe procedures tailored to the treatment population’s level of need. These guidelines are intended to provide a minimal level of methodological rigor for clinical trials seeking to apply tDCS outside a specialized treatment center. We outline indication-specific applications (Attention Deficit Hyperactivity Disorder, Depression, Multiple Sclerosis, Palliative Care following these recommendations that support a standardized framework for evaluating the tolerability and reproducibility of remote-supervised tDCS that, once established, will allow for translation of tDCS clinical trials to a greater size and range of patient populations.

  9. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  10. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  11. Breaking the Failed-State Cycle

    National Research Council Canada - National Science Library

    Haims, Marla C; Gompert, David C; Treverton, Gregory F; Stearns, Brooke K

    2008-01-01

    In their research and field experience, the authors have observed a wide gulf separating the treatment of the security problems of failed states from the treatment of those states economic problems...

  12. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  13. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    Science.gov (United States)

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  14. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  15. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  16. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  17. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  18. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  19. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003

  20. Protocol Additional to the agreement between the Republic of Palau and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Palau and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 10 May 2005 in New York and 13 May 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 13 May 2005, upon signature by the representatives of Palau and the Agency

  1. Protocol Additional to the Agreement Between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed in Vienna on 27 September 2007. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 27 September 2007, upon signature by the representatives of Burundi and the Agency

  2. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003.

  3. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003.

  4. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  5. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  6. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna [es

  7. Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 14 September 2004. It was signed on 9 December 2004 in Vienna

  8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  9. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  10. Laparoscopic revision of failed antireflux operations.

    Science.gov (United States)

    Serafini, F M; Bloomston, M; Zervos, E; Muench, J; Albrink, M H; Murr, M; Rosemurgy, A S

    2001-01-01

    A small number of patients fail fundoplication and require reoperation. Laparoscopic techniques have been applied to reoperative fundoplications. We reviewed our experience with reoperative laparoscopic fundoplication. Reoperative laparoscopic fundoplication was undertaken in 28 patients, 19 F and 9 M, of mean age 56 years +/- 12. Previous antireflux procedures included 19 open and 12 laparoscopic antireflux operations. Symptoms were heartburn (90%), dysphagia (35%), and atypical symptoms (30%%). The mean interval from antireflux procedure to revision was 13 months +/- 4.2. The mean DeMeester score was 78+/-32 (normal 14.7). Eighteen patients (64%) had hiatal breakdown, 17 (60%) had wrap failure, 2 (7%) had slipped Nissen, 3 (11%) had paraesophageal hernias, and 1 (3%) had an excessively tight wrap. Twenty-five revisions were completed laparoscopically, while 3 patients required conversion to the open technique. Complications occurred in 9 of 17 (53%) patients failing previous open fundoplications and in 4 of 12 patients (33%) failing previous laparoscopic fundoplications and included 15 gastrotomies and 1 esophagotomy, all repaired laparoscopically, 3 postoperative gastric leaks, and 4 pneumothoraces requiring tube thoracostomy. No deaths occurred. Median length of stay was 5 days (range 2-90 days). At a mean follow-up of 20 months +/- 17, 2 patients (7%) have failed revision of their fundoplications, with the rest of the patients being essentially asymptomatic (93%). The results achieved with reoperative laparoscopic fundoplication are similar to those of primary laparoscopic fundoplications. Laparoscopic reoperations, particularly of primary open fundoplication, can be technically challenging and fraught with complications. Copyright 2001 Academic Press.

  11. Report: demonstrable progresses of the France according the Kyoto protocol; Rapport: progres demontrables de la France selon le protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-06-15

    This document constitutes the report of the France on the demonstrable progresses according the application of the 3 article of the Kyoto protocol. The first chapter is a description of the french climatic policy, as the second presents the tendencies and the projections concerning the greenhouse effect gases emissions. The chapter 3 details the policies effects and the measures ( energy, transport, industry and wastes). The last chapter is devoted to the respect of the other engagements articles 10 and 11 of the Kyoto protocol. (A.L.B.)

  12. Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Choi Hyoung-Kee

    2011-01-01

    Full Text Available Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, we present a secure yet efficient protocol for a VANET that satisfies these security requirements. Although much research has attempted to address similar issues, we contend that our proposed protocol outperforms other proposals that have been advanced. This claim is based on observations that show that the proposed protocol has such strengths as light computational load, efficient storage management, and dependability.

  13. Rescue of failed filtering blebs with ab interno trephination.

    Science.gov (United States)

    Shihadeh, Wisam A; Ritch, Robert; Liebmann, Jeffrey M

    2006-06-01

    We evaluated the effectiveness of ab interno automated trephination as a technique for rescuing failed mature filtering blebs. A retrospective chart review of 40 failed blebs of 38 patients who had a posttrephination follow-up period of at least 3 months was done. With success defined as intraocular pressure (IOP) control with other modalities of management. Complications were few. We believe that ab interno trephination is an excellent option for rescuing selected failed filtering blebs.

  14. 77 FR 9846 - Source of Income From Qualified Fails Charges

    Science.gov (United States)

    2012-02-21

    ... temporary regulations noted that no trading practice existed at that time for fails charges on securities other than Treasuries, but that if a fails charge trading practice pertaining to other securities was... sources within the United States, and the income from the qualified fails charge is treated as effectively...

  15. Why Companies Fail? The Boiling Frog Syndrome

    OpenAIRE

    Ozcan, Rasim

    2018-01-01

    Why nations fail? An answer is given by Acemoglu and Robinson (2012) by pointing out the importance of institutions for an economy that leads to innovations for economic growth. Christensen (2012) asks a similar question for a firm and diagnoses why companies fail. In this study, I relate Acemoglu and Robinson (2012) with Christensen (2012) in order to better understand how to make companies more prosperous, more powerful, healthier, and live longer via innovations.

  16. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...

  17. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  18. Computer network time synchronization the network time protocol

    CERN Document Server

    Mills, David L

    2006-01-01

    What started with the sundial has, thus far, been refined to a level of precision based on atomic resonance: Time. Our obsession with time is evident in this continued scaling down to nanosecond resolution and beyond. But this obsession is not without warrant. Precision and time synchronization are critical in many applications, such as air traffic control and stock trading, and pose complex and important challenges in modern information networks.Penned by David L. Mills, the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  1. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  2. The effects of a tailored intensive care unit delirium prevention protocol: A randomized controlled trial.

    Science.gov (United States)

    Moon, Kyoung-Ja; Lee, Sun-Mi

    2015-09-01

    A decreased incidence of delirium following the application of non-pharmacologic intervention protocols to several patient populations has been previously reported. However, few studies have been conducted to examine the effects of their application to intensive care unit (ICU) patients. To examine the effects of applying a tailored delirium preventive protocol, developed by the authors, to ICU patients by analyzing its effects on delirium incidence, in-hospital mortality, ICU readmission, and length of ICU stay in a Korean hospital. A single-blind randomized controlled trial. A 1049-bed general hospital with a 105-bed ICU. Sixty and 63 ICU patients were randomly assigned to the intervention and control groups, respectively. The researchers applied the delirium prevention protocol to the intervention group every day for the first 7 days of ICU hospitalization. Delirium incidence, mortality, and re-admission to the ICU during the same hospitalization period were analyzed by logistic regression analysis; the 7- and 30-day in-hospital mortality by Kaplan-Meier survival and Cox proportional hazard regression analysis; and length of ICU stay was assessed by linear regression analysis. Application of the protocol had no significant effect on delirium incidence, in-hospital mortality, re-admission to the ICU, or length of ICU stay. Whereas the risk of 30-day in-hospital mortality was not significantly lower in the intervention than in the control group (OR: 0.33; 95% CI: 0.10-1.09), we found a significantly decreased 7-day in-hospital mortality in the intervention group after protocol application (HR: 0.09; 95% CI: 0.01-0.72). Application of a tailored delirium prevention protocol to acute stage patients during the first 7 days of ICU hospitalization appeared to reduce the 7-day in-hospital risk of mortality only for this patient population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 September 2001. It was signed in Vienna on 5 December 2001

  4. Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 1997. It was signed in Vienna on 29 September 1997

  5. Large-scale hydrological simulations using the soil water assessment tool, protocol development, and application in the danube basin.

    Science.gov (United States)

    Pagliero, Liliana; Bouraoui, Fayçal; Willems, Patrick; Diels, Jan

    2014-01-01

    The Water Framework Directive of the European Union requires member states to achieve good ecological status of all water bodies. A harmonized pan-European assessment of water resources availability and quality, as affected by various management options, is necessary for a successful implementation of European environmental legislation. In this context, we developed a methodology to predict surface water flow at the pan-European scale using available datasets. Among the hydrological models available, the Soil Water Assessment Tool was selected because its characteristics make it suitable for large-scale applications with limited data requirements. This paper presents the results for the Danube pilot basin. The Danube Basin is one of the largest European watersheds, covering approximately 803,000 km and portions of 14 countries. The modeling data used included land use and management information, a detailed soil parameters map, and high-resolution climate data. The Danube Basin was divided into 4663 subwatersheds of an average size of 179 km. A modeling protocol is proposed to cope with the problems of hydrological regionalization from gauged to ungauged watersheds and overparameterization and identifiability, which are usually present during calibration. The protocol involves a cluster analysis for the determination of hydrological regions and multiobjective calibration using a combination of manual and automated calibration. The proposed protocol was successfully implemented, with the modeled discharges capturing well the overall hydrological behavior of the basin. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  6. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  7. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  8. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  9. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [es

  10. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  11. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [fr

  12. Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non‑Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 16 April 2014 in Basseterre, Saint Kitts and Nevis, and on 19 May 2014 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 May 2014, upon signature by the representatives of Saint Kitts and Nevis and the Agency

  13. Protocol additional to the agreement between the Republic of Mali and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Mali and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 12 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Mali and the Agency, i.e. on 12 September 2002

  14. Use of national metrological references of dose absorbed in water and application of the IAEA TRS nr 398 dosimetry protocol to high energy photon beams. BNM-LNHB-LCIE-SFPM working group

    International Nuclear Information System (INIS)

    Chauvenet, B.; Delaunay, F.; Dolo, J.M.; Le Roy, G.; Bridier, A.; Francois, P.; Sabattier, R.

    2003-01-01

    Metrological references of dose absorbed in water for high energy photon beams used in radiotherapy have been elaborated during the past years by national calibration laboratories, and these new references are the basis of recent dosimetry protocols. However, the passage from metrological references of air kerma to dose absorbed in water, as well as the practical application of new calibration opportunities for dosemeters in high energy X ray beams requires a specific attention to maintain the consistency of dose measurement references over the hospital site. In this respect, this guide aims at the application of these metrological references. It proposes recommendations for the application of metrological references in terms of dose absorbed in water on the hospital site with reference to their determination conditions and to the implementation of the new IAEA dosimetry protocol (TRS nr 398). Thus, this guide proposes an overview of metrological references in French calibration laboratories, presents calibration methods (air kerma in a cobalt 60 gamma photon beam, dose absorbed in water) and a comparison with the IAEA TRS 277 dosimetry protocol. It addresses various practical aspects, and discusses uncertainties

  15. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  16. 7 CFR 983.152 - Failed lots/rework procedure.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Failed lots/rework procedure. 983.152 Section 983.152..., ARIZONA, AND NEW MEXICO Rules and Regulations § 983.152 Failed lots/rework procedure. (a) Inshell rework procedure for aflatoxin. If inshell rework is selected as a remedy to meet the aflatoxin regulations of this...

  17. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  18. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  19. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-11

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met.

  20. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 21 April 2011, the date on which the Agency received from the Kingdom of Morocco written notification that Morocco's statutory and constitutional requirements for entry into force had been met

  1. Predicting environmental aspects of CCSR leachates through the application of scientifically valid leaching protocols

    International Nuclear Information System (INIS)

    Hassett, D.J.

    1993-01-01

    The disposal of solid wastes from energy production, particularly solid wastes from coal conversion processes, requires a thorough understanding of the waste material as well as the disposal environment. Many coal conversion solid residues (CCSRs) have chemical, mineralogical, and physical properties advantageous for use as engineering construction materials and in other industrial applications. If disposal is to be the final disposition of CCSRs from any source, the very properties that can make ash useful also contribute to behavior that must be understood for scientifically logical and environmentally responsible disposal. This paper describes the application of scientifically valid leaching and characterization tests designed to predict field phenomena. The key to proper characterization of these unique materials is the recognition of and compensation for the hydration reactions that can occur during long-term leaching. Many of these reactions, such as the formation of the mineral ettringite, can have a profound effect on the concentration of potentially problematic trace elements such as boron, chromium, and selenium. The mobility of these elements, which may be concentrated in CCSRs due to the conversion process, must be properly evaluated for the formation of informed and scientifically sound decisions regarding safe disposal. Groundwater is an extremely important and relatively scarce resource. Contamination of this resource is a threat to life, which is highly dependent on it, so management of materials that can impact groundwater must be carefully planned and executed. The application of scientifically valid leaching protocols and complete testing are critical to proper waste management

  2. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  3. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  4. Ultrasonics aids the identification of failed fuel rods

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    Over a number of years Brown Boveri Reaktor of West Germany has developed and commercialized an ultrasonic failed fuel rod detection system. Sipping has up to now been the standard technique for failed fuel detection, but sipping can only indicate whether or not an assembly contains defective rods; the BBR system can tell which rod is defective. (author)

  5. Reliability testing of failed fuel location system

    International Nuclear Information System (INIS)

    Vieru, G.

    1996-01-01

    This paper presents the experimental reliability tests performed in order to prove the reliability parameters for Failed Fuel Location System (FFLS), equipment used to detect in which channel of a particular heat transport loop a fuel failure is located, and to find in which channel what particular bundle pair is failed. To do so, D20 samples from each reactor channel are sequentially monitored to detect a comparatively high level of delayed neutron activity. 15 refs, 8 figs, 2 tabs

  6. Failing by design.

    Science.gov (United States)

    McGrath, Rita Gunther

    2011-04-01

    It's hardly news that business leaders work in increasingly uncertain environments, where failures are bound to be more common than successes. Yet if you ask executives how well, on a scale of one to 10, their organizations learn from failure, you'll often get a sheepish "Two-or maybe three" in response. Such organizations are missing a big opportunity: Failure may be inevitable but, if managed well, can be very useful. A certain amount of failure can help you keep your options open, find out what doesn't work, create the conditions to attract resources and attention, make room for new leaders, and develop intuition and skill. The key to reaping these benefits is to foster "intelligent failure" throughout your organization. McGrath describes several principles that can help you put intelligent failure to work. You should decide what success and failure would look like before you start a project. Document your initial assumptions, test and revise them as you go, and convert them into knowledge. Fail fast-the longer something takes, the less you'll learn-and fail cheaply, to contain your downside risk. Limit the number of uncertainties in new projects, and build a culture that tolerates, and sometimes even celebrates, failure. Finally, codify and share what you learn. These principles won't give you a means of avoiding all failures down the road-that's simply not realistic. They will help you use small losses to attain bigger wins over time.

  7. Protocol Additional to the Agreement between Canada and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998 [fr

  8. In-core sipping method for the identification of failed fuel assemblies

    International Nuclear Information System (INIS)

    Wu Zhongwang; Zhang Yajun

    2000-01-01

    The failed fuel assembly identification system is an important safety system which ensures safe operations of reactor and immediate treatment of failed fuel rod cladding. The system uses an internationally recognized method to identify failed fuel assemblies in a reactor with fuel element cases. The in-core sipping method is customary used to identify failed fuel assemblies during refueling or after fuel rod cladding failure accidents. The test is usually performed after reactor shutdown by taking samples from each fuel element case while the cases are still in their original core positions. The sample activity is then measured to identify failed fuel assemblies. A failed fuel assembly identification system was designed for the NHR-200 based on the properties of the NHR-200 and national requirements. the design provides an internationally recognized level of safety to ensure the safety of NHR-200

  9. Weeded Out? Gendered Responses to Failing Calculus.

    Science.gov (United States)

    Sanabria, Tanya; Penner, Andrew

    2017-06-01

    Although women graduate from college at higher rates than men, they remain underrepresented in science, technology, engineering, and mathematics (STEM) fields. This study examines whether women react to failing a STEM weed-out course by switching to a non-STEM major and graduating with a bachelor's degree in a non-STEM field. While competitive courses designed to weed out potential STEM majors are often invoked in discussions around why students exit the STEM pipeline, relatively little is known about how women and men react to failing these courses. We use detailed individual-level data from the National Educational Longitudinal Study (NELS) Postsecondary Transcript Study (PETS): 1988-2000 to show that women who failed an introductory calculus course are substantially less likely to earn a bachelor's degree in STEM. In doing so, we provide evidence that weed-out course failure might help us to better understand why women are less likely to earn degrees.

  10. DECOFF Probabilities of Failed Operations

    DEFF Research Database (Denmark)

    Gintautas, Tomas

    2015-01-01

    A statistical procedure of estimation of Probabilities of Failed Operations is described and exemplified using ECMWF weather forecasts and SIMO output from Rotor Lift test case models. Also safety factor influence is investigated. DECOFF statistical method is benchmarked against standard Alpha-factor...

  11. Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel

    International Nuclear Information System (INIS)

    Huang, Wei; Su, Qi; Li, Yan-Bing; Sun, Ying

    2014-01-01

    In this paper, a quantum key distribution (QKD) protocol, which can be immune to collective amplitude damping noise, is proposed with collective detection strategy. Then a multi-party quantum secret sharing (MQSS) protocol and a quantum private comparison (QPC) protocol are introduced as two applications of the proposed QKD protocol. Except for one participant who is responsible for preparing and measuring quantum states, the rest of the users in each of these protocols only need to perform certain unitary operations due to the utilization of collective detection. Therefore, in addition to the advantage of being secure against collective amplitude damping noise, the proposed protocols still have the advantages of higher qubit efficiency and lower cost for implementation. Moreover, the security of these protocols is guaranteed by theorems on quantum operation discrimination. (papers)

  12. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  13. Failed fuel detection device

    International Nuclear Information System (INIS)

    Kawai, Masayoshi; Hayashida, Yoshihisa; Niidome, Jiro.

    1985-01-01

    Purpose: To prevent intrusion of background neutrons to neutron detectors thereby improve the S/N ratio of the detectors in the failed fuel detection device of LMFBR type reactors. Constitution: Neutrons from the reactor core pass through the gaps around the penetration holes in which the primary pipeways pass through the concrete shielding walls and pass through the gaps between the thermal shielding members and the neutron moderating shielding members of the failed fuel detection device and then intrude into the neutron detectors. In view of the above, inner neutron moderating shielding members and movable or resilient neutron shielding members are disposed to the inside of the neutron moderating shielding member. Graphite or carbon hydrides such as paraffin or synthetic resin with a large neutron moderation effect are used as the outer moderating shielding member and materials such as boron or carbon are used for the inner members. As a result, the background neutrons are shielded by the inner neutron moderating shielding members and the resilient neutron shielding members, by which the S/N ratio of the neutron detectors can be increased to 2 - 4 times. (Moriyama, K.)

  14. Failed fuel detector

    International Nuclear Information System (INIS)

    Kogure, Sumio; Seya, Toru; Watanabe, Masaaki.

    1976-01-01

    Purpose: To enhance the reliability of a failed fuel detector which detects radioactivity of nuclear fission products leaked out from fuel elements in cooling water. Constitution: Collected specimen is introduced into a separator and co-existing material considered to be an impediment is separated and removed by ion exchange resins, after which this specimen is introduced into a container housing therein a detector to systematically measure radioactivity. Thereby, it is possible to detect a signal lesser in variation in background, and inspection work also becomes simple. (Kawakami, Y.)

  15. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    Science.gov (United States)

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  16. A Distributed Approach towards Improved Dissemination Protocol for Smooth Handover in MediaSense IoT Platform

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-05-01

    Full Text Available Recently, the Internet has been utilized by many applications to convey time-sensitive messages. The persistently expanding Internet coverage and its easy accessibility have offered to ascend to a problem which was once regarded as not essential to contemplate. Nowadays, the Internet has been utilized by many applications to convey time-sensitive messages. Wireless access points have widely been used but these access points have limitations regarding area coverage. So for covering a wider space, various access points need to be introduced. Therefore, when the user moves to some other place, the devices expected to switch between access points. Packet loss amid the handovers is a trivial issue. MediaSense is an Internet of Things distributed architecture enabling the development of the IoT application faster. It deals with this trivial handover issue by utilizing a protocol called Distributed Context eXchange Protocol. However, this protocol is centralized in nature and also suffers in a scenario when both sender and receiver address change simultaneously. This paper presents a mechanism to deal with this scenario and presents a distributed solution to deal with this issue within the MediaSense platform. The proposed protocol improves dissemination using retransmission mechanism to diminish packet loss. The proposed protocol has been delineated with a proof of concept chat application and the outcomes have indicated a significant improvement in terms of packet loss.

  17. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  18. Why did the League of Nations fail?

    OpenAIRE

    Jari Eloranta

    2011-01-01

    Why did the League of Nations ultimately fail to achieve widespread disarmament, its most fundamental goal? This article shows that the failure of the League of Nations had two important dimensions: (1) the failure to provide adequate security guarantees for its members (like an alliance); (2) the failure of this organization to achieve the disarmament goals it set out in the 1920s and 1930s. Thus, it was doomed from the outset to fail, due to built-in institutional contradictions. It can als...

  19. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  20. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  1. The Text of a Protocol between the Agency and the Governments of Thailand and the United States of America Terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and Terminating the Protocol Suspending that Agreement

    International Nuclear Information System (INIS)

    1976-01-01

    The text of a protocol between the Agency and the Governments of Thailand and the United States of America terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and terminating the Protocol suspending that Agreement is reproduced in this document for the information of all Members. The Protocol entered into force on 27 June 1974, pursuant to Section 6 thereof.

  2. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  3. Single-Rooted Extraction Sockets: Classification and Treatment Protocol.

    Science.gov (United States)

    El Chaar, Edgar; Oshman, Sarah; Fallah Abed, Pooria

    2016-09-01

    Clinicians have many treatment techniques from which to choose when extracting a failing tooth and replacing it with an implant-supported restoration and when successful management of an extraction socket during the course of tooth replacement is necessary to achieve predictable and esthetic outcomes. This article presents a straightforward, yet thorough, classification for extraction sockets of single-rooted teeth and provides guidance to clinicians in the selection of appropriate and predictable treatment. The presented classification of extraction sockets for single-rooted teeth focuses on the topography of the extraction socket, while the protocol for treatment of each socket type factors in the shape of the remaining bone, the biotype, and the location of the socket whether it be in the mandible or maxilla. This system is based on the biologic foundations of wound healing and can help guide clinicians to successful treatment outcomes.

  4. A Conscious Sedation Protocol for Videolaryngostroboscopy in Pediatric Patients

    Directory of Open Access Journals (Sweden)

    Samantha Anne

    2010-01-01

    Full Text Available Objective. To determine best sedation protocol for videolaryngostroboscopy in children unable to tolerate non-sedated evaluation. Materials and Methods. Consecutive case series of 10 children with voice disturbances, unable to tolerate nonsedated videolaryngostroboscopy at an academic tertiary care children’s hospital. Flexible fiberoptic videolaryngostroboscopy was performed and interpreted by pediatric otolaryngologist and speech and language pathologist. Sedation was administered with newly described protocol that allowed functional portion of evaluation. Main Outcome Measures: ability to follow commands and tolerate flexible fiberoptic videolaryngostroboscopy. Secondary Outcome Measures: total phonation time, complications, need for subsequent videolaryngostroboscopic attempts, clinical outcomes, and follow-up. Results. 10 children underwent procedure under conscious sedation. 9/10 children were able to perform simple tasks and maintain adequate phonation time to complete stroboscopic exam. 1/10 patients failed to complete exam because of crying during entire exam. Mean exam time was 2 minutes 52 seconds (SD 86 seconds, phonation time is 1 minute 44 seconds (SD 60 seconds, and number of tasks completed was 10.5 (SD 8.6. Conclusions. Conscious sedation for videolaryngostroboscopy can be safely and effectively performed in children unable to comply with nonsedated examination. Such studies provide valuable diagnostic information to make a diagnosis and to devise a treatment plan.

  5. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2001-01-01

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  6. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-05-04

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001.

  7. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  8. Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed on 26 May 2008 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the Republic of Montenegro written notification that Montenegro's statutory and constitutional requirements for entry into force had been met

  9. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-12

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met.

  10. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met [es

  11. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  12. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  13. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met

  14. Protocol Additional to the agreement between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 5 July 2000. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Azerbaijan written notification that Azerbaijan's statutory and/or constitutional requirements for entry into force have been met, i.e. on 29 November 2000

  15. Failed total carpometacarpal joint prosthesis of the thumb

    DEFF Research Database (Denmark)

    Hansen, Torben Bæk; Homilius, Morten

    2010-01-01

    Total joint prosthesis in carpometacarpal joint arthritis of the thumb often fails. Loosening of the implant is often treated by resection arthroplasty, and we reviewed 10 patients, mean age 54 years (range 47-63) who were treated by resection arthroplasty after a failed total joint prosthesis. T...... in eight of 10 patients, but the mean Disabilities of the arm, shoulder, and hand (DASH) scores, self-reported pinch-grip-related function, and pain were comparable with our earlier published results with the Elektra carpometacarpal total joint prosthesis.......Total joint prosthesis in carpometacarpal joint arthritis of the thumb often fails. Loosening of the implant is often treated by resection arthroplasty, and we reviewed 10 patients, mean age 54 years (range 47-63) who were treated by resection arthroplasty after a failed total joint prosthesis....... The male:female ratio was 1:4 and the mean duration of observation 32 months (range 6-52). In three patients the revised implant was a MOJE uncemented carpometacarpal joint prosthesis and in seven patients an Elektra uncemented one. At follow-up grip strength was reduced to less than 90% of the other hand...

  16. Protocol Additional to the agreement between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 28 September 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from the Czech Republic written notification that the Czech Republic's statutory and/or constitutional requirements for entry into force have been met, i.e. on 1 July 2002

  17. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  18. Review of a fluid resuscitation protocol: "fluid creep" is not due to nursing error.

    Science.gov (United States)

    Faraklas, Iris; Cochran, Amalia; Saffle, Jeffrey

    2012-01-01

    Recent reviews of burn resuscitation have included the suggestion that "fluid creep" may be influenced by practitioner error. Our center uses a nursing-driven resuscitation protocol that permits titration of fluid based on hourly urine output, including the addition of colloid when patients fail to respond appropriately. The purpose of this study was to examine protocol compliance. We reviewed 140 patients (26 children) with burns of ≥20% TBSA who received protocol-directed resuscitation from 2005 to 2010. We compared each patient's actual hourly fluid infusion with that predicted by the protocol. Sixty-seven patients (48%) completed resuscitation using crystalloid alone, whereas 73 patients required colloid supplementation. Groups did not differ in age, gender, weight, or time from injury to admission. Patients requiring colloid had larger median total burns (33.0 vs 23.5% TBSA) and full-thickness burns (15.5 vs 4.5% TBSA) and more inhalation injuries (60.3 vs 28.4%; P patients had median predicted requirements of 5.4 ml/kg/%TBSA. Crystalloid-only patients required fluid volumes close to Parkland predictions (4.7 ml/kg/%TBSA), whereas patients who received colloid required more fluid than the predicted volume (7.5 ml/kg/%TBSA). However, the hourly difference between the predicted and received fluids was a median of only 1.0% (interquartile range: -6.1 to 11.1%) and did not differ between groups. Pediatric patients had greater calculated differences than adults. Crystalloid patients exhibited higher urine outputs than colloid patients until colloid was started, suggesting that early over-resuscitation did not contribute to fluid creep. Adherence to our protocol for burn shock resuscitation was excellent overall. Fluid creep exhibited by more seriously injured patients was not due to nurses' failure to follow the protocol. This review has illuminated some opportunities for practice improvement, possibly using a computerized decision support system.

  19. Applications of the Italian protocol for the calibration of brachytherapy sources

    International Nuclear Information System (INIS)

    Piermattei, A.; Azario, L.

    1997-01-01

    The Associazione Italiana di Fisica Biomedica (AIFB; Italian Association of Biomedical Physics) has adopted the Italian protocol for the calibration of brachytherapy sources. The AIFB protocol allows measurements of the reference air kerma rate, dK/dt r , within 1.7% (1σ). To measure dK/dt r the AIFB protocol has identified a direct and an indirect procedure. The direct procedure is based on the use of spherical or cylindrical ionization chambers as local reference dosimeters positioned along the transverse bisector axis of the source. Once the source is specified by a dK/dt r value, this can be used to calibrate a field instrument, such as a well-type ionization chamber, for further source calibrations by means of an indirect procedure. This paper reports the results obtained by the Physics Laboratory of the Universita Cattolica del S Cuore (PL-UCSC), in terms of dK/dt r calibration of five types of source, 169 Yb, 192 Ir and 137 Cs. The role of the dK/dt r determination for a brachytherapy source has been underlined when a new source such as the 169 Yb seed model X1267 has been proposed for clinical use. The dK/dt r values for 137 Cs spherical sources differed by 5% from the vendor's mean value. The five types of source calibrated in terms of dK/dt r were used to obtain the calibration factor, N K r source , of an HDR-1000 well-type ionization chamber. (author)

  20. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2018-01-01

    In many practical wireless systems, the signal-to-interference-and-noise ratio (SINR) that is applicable to a certain transmission, referred to as channel state information (CSI), can only be learned after the transmission has taken place and is thereby delayed (outdated). In such systems, hybrid...... automatic repeat request (HARQ) protocols are often used to achieve high throughput with low latency. This paper put forth the family of expandable message space (EMS) protocols that generalize the HARQ protocol and allow for rate adaptation based on delayed CSI at the transmitter (CSIT). Assuming a block...

  1. MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

    Directory of Open Access Journals (Sweden)

    Elis Kulla

    2010-01-01

    Full Text Available Recently, a great interest is shown in MANETs potential usage and applications in several fields such as military activities, rescue operations and time-critical applications. In this work, we implement and analyse a MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing in MANET and evaluate the performance of the network through experiments in a real environment. The performance assessment of our testbed is done considering throughput, number of dropped packets and delay. We designed four scenarios: Static, Source Moving, Destination Moving and Source-Destination Moving. From our experimental results, we concluded that when the communicating nodes are moving and the routes change quickly, OLSR (as a proactive protocol performs better than AODV, which is a reactive protocol.

  2. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols.

    Science.gov (United States)

    Bleakley, C M; McDonough, S M; MacAuley, D C; Bjordal, J

    2006-08-01

    The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Sportsmen (n = 44) and members of the general public (n = 45) with mild/moderate acute ankle sprains. Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n = 46) or intermittent ice application (n = 43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0 degrees C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury.

  3. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  4. Thermal analysis of the failed equipment storage vault system

    International Nuclear Information System (INIS)

    Jerrell, J.; Lee, S.Y.; Shadday, A.

    1995-07-01

    A storage facility for failed glass melters is required for radioactive operation of the Defense Waste Processing Facility (DWPF). It is currently proposed that the failed melters be stored in the Failed Equipment Storage Vaults (FESV's) in S area. The FESV's are underground reinforced concrete structures constructed in pairs, with adjacent vaults sharing a common wall. A failed melter is to be placed in a steel Melter Storage Box (MSB), sealed, and lowered into the vault. A concrete lid is then placed over the top of the FESV. Two melters will be placed within the FESV/MSB system, separated by the common wall. There is no forced ventilation within the vault so that the melter is passively cooled. Temperature profiles in the Failed Equipment Storage Vault Structures have been generated using the FLOW3D software to model heat conduction and convection within the FESV/MSB system. Due to complexities in modeling radiation with FLOW3D, P/THERMAL software has been used to model radiation using the conduction/convection temperature results from FLOW3D. The final conjugate model includes heat transfer by conduction, convection, and radiation to predict steady-state temperatures. Also, the FLOW3D software has been validated as required by the technical task request

  5. Performance Evaluation of AODV Routing Protocol in VANET with NS2

    Directory of Open Access Journals (Sweden)

    Divya Rathi

    2017-03-01

    Full Text Available In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.

  6. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 22 March 2013, upon signature by the representatives of the Denmark and the Agency.

  7. Analysis of failed nuclear plant components

    International Nuclear Information System (INIS)

    Diercks, D.R.

    1993-01-01

    Argonne National Laboratory has conducted analyses of failed components from nuclear power-generating stations since 1974. The considerations involved in working with an analyzing radioactive components are reviewed here, and the decontamination of these components is discussed. Analyses of four failed components from nuclear plants are then described to illustrate the kinds of failures seen in service. The failures discussed are (1) intergranular stress-corrosion cracking of core spray injection piping in a boiling water reactor, (2) failure of canopy seal welds in adapter tube assemblies in the control rod drive head of a pressurized water reactor, (3) thermal fatigue of a recirculation pump shaft in a boiling water reactor, and (4) failure of pump seal wear rings by nickel leaching in a boiling water reactor

  8. Analysis of failed nuclear plant components

    International Nuclear Information System (INIS)

    Diercks, D.R.

    1992-07-01

    Argonne National Laboratory has conducted analyses of failed components from nuclear power generating stations since 1974. The considerations involved in working with and analyzing radioactive components are reviewed here, and the decontamination of these components is discussed. Analyses of four failed components from nuclear plants are then described to illustrate the kinds of failures seen in service. The failures discussed are (a) intergranular stress corrosion cracking of core spray injection piping in a boiling water reactor, (b) failure of canopy seal welds in adapter tube assemblies in the control rod drive head of a pressure water reactor, (c) thermal fatigue of a recirculation pump shaft in a boiling water reactor, and (d) failure of pump seal wear rings by nickel leaching in a boiling water reactor

  9. From the Copenhagen Accord to efficient technology protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates

    2012-01-01

    As the Copenhagen Conference of Parties (COP) failed to negotiate a binding Post-Kyoto agreement, an alternative is proposed based on the Copenhagen Accord (CA). The CA, as endorsed by COP16 in Cancun, aims to combat global warming with differentiated reduction targets of greenhouse gas emissions and by mobilizing resources supporting adaptation and carbon-free technology in developing countries (DCs). Using a special version of MERGE, we study the global implications of the CA postulating extensions of the Accord in the direction of Technology Transfer Protocols (TTPs). We assess scenarios needed to reach sustainable climate targets under such Protocols. It is shown that without binding commitments for DCs, the warming target of 2 °C will be exceeded with a probability above 50%, even if Annex B countries eliminate their emissions. However, moderate commitments of DCs (when they reach sufficient economic development), make the 2 °C scenario feasible. TTPs combined with binding emission reduction targets thus provide a mechanism to reduce climate change damages, and may generate significant secondary benefits. For example, the reduced tax-subsidy scenario (RTS20) has 77% to 40% chances to remain below 2 °C of warming and an undiscounted cumulative gross domestic product (GDP) cost of 0.75% relative to baseline (not accounting for the benefits of avoided damages). - Highlights: ► Based on the Copenhagen Accord we propose an extension of the Kyoto Protocol. ► The carbon tax-revenue of industrialized countries subsidizes Technology Transfer to DCs and R and D. ► Emissions of Kyoto gases are reduced such that the probability of exceeding 2 °C is well below 50%. ► These scenarios assume moderate binding commitments for DCs after 2030. ► The undiscounted cumulative GDP costs are 0.75% above baseline.

  10. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  11. Development of failed fuel detection and location system in sodium-cooled large reactor. Sampling method of failed fuels under the slit

    International Nuclear Information System (INIS)

    Aizawa, Kousuke; Fujita, Kaoru; Kamide, Hideki; Kasahara, Naoto

    2010-01-01

    A conceptual design study of Japan Sodium-cooled Fast Reactor (JSFR) is in progress as an issue of the 'Fast Reactor Cycle Technology Development (FaCT)' project in Japan. JSFR adopts a Selector-Valve mechanism for the failed fuel detection and location (FFDL) system. The Selector-Valve FFDL system identifies failed fuel subassemblies by sampling sodium from each fuel subassembly outlet and detecting fission product. One of the JSFR design features is employing an upper internal structure (UIS) with a radial slit, in which an arm of fuel handling machine can move and access the fuel assemblies under the UIS. Thus, JSFR cannot place sampling nozzles right above the fuel subassemblies located under the slit. In this study, the sampling method for indentifying under-slit failed fuel subassemblies has been demonstrated by water experiments. (author)

  12. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  13. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  14. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  15. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  16. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  17. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-10-29

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999.

  18. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  19. The SHIP: A SIP to HTTP Interaction Protocol

    Science.gov (United States)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  20. Protocol Additional to the agreement between the Union of the Comoros and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Union of the Comoros and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed in Vienna on 13 December 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 January 2009, the date on which the Agency received from the Union of the Comoros written notification that Comoros' statutory and constitutional requirements for entry into force had been met

  1. Failing States or Failing Models?: Accounting for the Incidence of State Collapse

    OpenAIRE

    Martin Doornbos

    2010-01-01

    In recent years the notion and phenomenon of .failingÿ states - states deemed incapable to fulfil the basic tasks of providing security for their populace -, has been rapidly drawing attention. I will start off with a closer look at the inci- dence of fragile states and state failure, more specifically of state collapse. Connected with this, I will raise the question of differential degrees of propensity to failure and collapse among contemporary state systems, and to point to apparent region...

  2. [Results of revision after failed surgical treatment for traumatic anterior shoulder instability].

    Science.gov (United States)

    Lópiz-Morales, Y; Alcobe-Bonilla, J; García-Fernández, C; Francés-Borrego, A; Otero-Fernández, R; Marco-Martínez, F

    2013-01-01

    Persistent or recurrent glenohumeral instability after a previous operative stabilization can be a complex problem. Our aim is to establish the incidence of recurrence and its revision surgery, and to analyse the functional results of the revision instability surgery, as well as to determine surgical protocols to perform it. A retrospective analysis was conducted on 16 patients with recurrent instability out of 164 patients operated on between 1999 and 2011. The mean follow-up was 57 months and the mean age was 29 years. To evaluate functional outcome we employed Constant, Rowe, UCLA scores and the visual analogue scale. Of the 12 patients who failed the initial arthroscopic surgery, 6 patients underwent an arthroscopic antero-inferior labrum repair technique, 4 using open labrum repair techniques, and 2 coracoid transfer. The two cases of open surgery with recurrences underwent surgery for coracoid transfer. Results of the Constant score were excellent or good in 64% of patients. Surgical revision of instability is a complex surgery essentially for two reasons: the difficulty in recognising the problem, and the technical demand (greater variety and the increasingly complex techniques). Copyright © 2012 SECOT. Published by Elsevier Espana. All rights reserved.

  3. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  4. Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 22 November 2007. It was signed on 23 June 2010 in Lisbon, Portugal, and on 8 July 2010 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 March 2011, the date on which the Agency received from the Republic of Mozambique written notification that Mozambique's statutory and constitutional requirements for entry into force had been met

  5. Strategically Leapfrogging Education in Prehospital Trauma Management: Four-Tiered Training Protocols.

    Science.gov (United States)

    Abraham, Rohit; Vyas, Dinesh; Narayan, Mayur; Vyas, Arpita

    2015-12-01

    Trauma-related injury in fast developing countries are linked to 90% of international mortality rates, which can be greatly reduced by improvements in often non-existent or non-centralized emergency medical systems (EMS)-particularly in the pre-hospital care phase. Traditional trauma training protocols-such as Advanced Trauma Life Support (ATLS), International Trauma Life Support (ITLS), and Basic Life Support (BLS)-have failed to produce an effective pre-hospital ground force of medical first responders. To overcome these barriers, we propose a new four-tiered set of trauma training protocols: Massive Open Online Course (MOOC) Trauma Training, Acute Trauma Training (ATT), Broad Trauma Training (BTT), and Cardiac and Trauma Training (CTT). These standards are specifically differentiated to accommodate the educational and socioeconomic diversity found in fast developing settings, where each free course is taught in native, lay language while ensuring the education standards are maintained by fully incorporating high-fidelity simulation, video-recorded debriefing, and retraining. The innovative pedagogy of this trauma education program utilizes MOOC for global scalability and a "train-the-trainer" approach for exponential growth-both components help fast developing countries reach a critical mass of first responders needed for the base of an evolving EMS.

  6. Anti-Mullerian hormone-tailored stimulation protocols improve outcomes whilst reducing adverse effects and costs of IVF.

    Science.gov (United States)

    Yates, A P; Rustamov, O; Roberts, S A; Lim, H Y N; Pemberton, P W; Smith, A; Nardo, L G

    2011-09-01

    Anti-Müllerian hormone (AMH) is increasingly used to quantify ovarian reserve, but it has not yet realized its full clinical potential in assisted reproduction technology. We investigated the possible benefits of using novel, stratified ovarian hyperstimulation protocols, tailored to individual AMH levels, compared with conventional stimulation. Retrospective data were collected from 769 women (first cycle of IVF, using fresh embryos), in a UK tertiary care unit: 346 women using conventional stimulation protocols; 423 women treated under new AMH-tailored protocols. Embryo transfer rates increased significantly (79-87%: P= 0.002) after the introduction of AMH-tailored stimulation protocols. Pregnancy rate per cycle started and live birth rate also increased significantly compared with conventionally treated women (17.9-27.7%, P= 0.002 and 15.9-23.9%, P = 0.007, respectively). Moreover, in the AMH group, the incidence of the ovarian hyperstimulation syndrome (OHSS) fell significantly (6.9-2.3%, P = 0.002) and failed fertilization fell from 7.8 to 4.5%. The cost of fertility drug treatment fell by 29% per patient and the overall cost of clinical management of OHSS fell by 43% in the AMH group. GnRH antagonist protocols, introduced as part of AMH-tailored treatment, may have contributed to the observed improvements: however, within the AMH-tailored group, the live birth rate was not significantly different between agonist and antagonist-treated groups. Although large, prospective, multicentre studies are indicated, we have clearly demonstrated that individualized, AMH-guided, controlled ovarian hyperstimulation protocols significantly improved positive clinical outcomes, reduced the incidence of complications and reduced the financial burden associated with assisted reproduction.

  7. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  8. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  9. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [fr

  10. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [es

  11. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  12. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  13. Analysis of failed nuclear plant components

    Science.gov (United States)

    Diercks, D. R.

    1993-12-01

    Argonne National Laboratory has conducted analyses of failed components from nuclear power- gener-ating stations since 1974. The considerations involved in working with and analyzing radioactive compo-nents are reviewed here, and the decontamination of these components is discussed. Analyses of four failed components from nuclear plants are then described to illustrate the kinds of failures seen in serv-ice. The failures discussed are (1) intergranular stress- corrosion cracking of core spray injection piping in a boiling water reactor, (2) failure of canopy seal welds in adapter tube assemblies in the control rod drive head of a pressurized water reactor, (3) thermal fatigue of a recirculation pump shaft in a boiling water reactor, and (4) failure of pump seal wear rings by nickel leaching in a boiling water reactor.

  14. Five days of successful oral alimentation for hospitalized patients based upon passing the Yale Swallow Protocol.

    Science.gov (United States)

    Leder, Steven B; Suiter, Debra M

    2014-09-01

    This study aimed to determine the success of oral alimentation and patient retention rate 1 to 5 days after passing the Yale Swallow Protocol. Participants were 200 consecutive acute care inpatients referred for swallow assessment. Inclusion criteria were adequate cognitive abilities to participate safely, completing an oral mechanism examination, and passing the 3-ounce water swallow challenge. Exclusion criteria were altered mental status, failing the 3-ounce challenge, preadmission dysphagia, head-of-bed restrictions alimentation and retention rate. All patients who remained medically and neurologically stable drank thin liquids and ate successfully 1 to 5 days after passing the protocol. Mean (SD) volume of liquid ingested per day was 474.2 (435.5) cc. Patient retention declined steadily from day of testing (n = 200) through post-testing day 5 (n = 95). Passing the Yale Swallow Protocol allowed for initial determination of aspiration risk followed by successful oral alimentation for 1 to 5 days in medically and neurologically stable acute care hospitalized patients and without the need for instrumental dysphagia testing. The decline in patient retention was expected because of increasingly rapid transit through the acute care setting, which often renders longer follow-up problematic. © The Author(s) 2014.

  15. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  16. Comparison of Diffusion MRI Acquisition Protocols for the In Vivo Characterization of the Mouse Spinal Cord: Variability Analysis and Application to an Amyotrophic Lateral Sclerosis Model.

    Science.gov (United States)

    Figini, Matteo; Scotti, Alessandro; Marcuzzo, Stefania; Bonanno, Silvia; Padelli, Francesco; Moreno-Manzano, Victoria; García-Verdugo, José Manuel; Bernasconi, Pia; Mantegazza, Renato; Bruzzone, Maria Grazia; Zucca, Ileana

    2016-01-01

    Diffusion-weighted Magnetic Resonance Imaging (dMRI) has relevant applications in the microstructural characterization of the spinal cord, especially in neurodegenerative diseases. Animal models have a pivotal role in the study of such diseases; however, in vivo spinal dMRI of small animals entails additional challenges that require a systematical investigation of acquisition parameters. The purpose of this study is to compare three acquisition protocols and identify the scanning parameters allowing a robust estimation of the main diffusion quantities and a good sensitivity to neurodegeneration in the mouse spinal cord. For all the protocols, the signal-to-noise and contrast-to noise ratios and the mean value and variability of Diffusion Tensor metrics were evaluated in healthy controls. For the estimation of fractional anisotropy less variability was provided by protocols with more diffusion directions, for the estimation of mean, axial and radial diffusivity by protocols with fewer diffusion directions and higher diffusion weighting. Intermediate features (12 directions, b = 1200 s/mm2) provided the overall minimum inter- and intra-subject variability in most cases. In order to test the diagnostic sensitivity of the protocols, 7 G93A-SOD1 mice (model of amyotrophic lateral sclerosis) at 10 and 17 weeks of age were scanned and the derived diffusion parameters compared with those estimated in age-matched healthy animals. The protocols with an intermediate or high number of diffusion directions provided the best differentiation between the two groups at week 17, whereas only few local significant differences were highlighted at week 10. According to our results, a dMRI protocol with an intermediate number of diffusion gradient directions and a relatively high diffusion weighting is optimal for spinal cord imaging. Further work is needed to confirm these results and for a finer tuning of acquisition parameters. Nevertheless, our findings could be important for the

  17. Report: demonstrable progresses of the France according the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-06-01

    This document constitutes the report of the France on the demonstrable progresses according the application of the 3 article of the Kyoto protocol. The first chapter is a description of the french climatic policy, as the second presents the tendencies and the projections concerning the greenhouse effect gases emissions. The chapter 3 details the policies effects and the measures ( energy, transport, industry and wastes). The last chapter is devoted to the respect of the other engagements articles 10 and 11 of the Kyoto protocol. (A.L.B.)

  18. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  19. Experience with failed or damaged spent fuel and its impacts on handling

    International Nuclear Information System (INIS)

    Bailey, W.J.

    1989-12-01

    Spent fuel management planning needs to include consideration of failed or damaged spent light-water reactor (LWR) fuel. Described in this paper, which was prepared under the Commercial Spent Fuel Management (CSFM) Program that is sponsored by the US Department of Energy (DOE), are the following: the importance of fuel integrity and the behavior of failed fuel, the quantity and burnup of failed or damaged fuel in storage, types of defects, difficulties in evaluating data on failed or damaged fuel, experience with wet storage, experience with dry storage, handling of failed or damaged fuel, transporting of fuel, experience with higher burnup fuel, and conclusions. 15 refs

  20. Evaluating Data Abstraction Assistant, a novel software application for data abstraction during systematic reviews: protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ian J. Saldanha

    2016-11-01

    Full Text Available Abstract Background Data abstraction, a critical systematic review step, is time-consuming and prone to errors. Current standards for approaches to data abstraction rest on a weak evidence base. We developed the Data Abstraction Assistant (DAA, a novel software application designed to facilitate the abstraction process by allowing users to (1 view study article PDFs juxtaposed to electronic data abstraction forms linked to a data abstraction system, (2 highlight (or “pin” the location of the text in the PDF, and (3 copy relevant text from the PDF into the form. We describe the design of a randomized controlled trial (RCT that compares the relative effectiveness of (A DAA-facilitated single abstraction plus verification by a second person, (B traditional (non-DAA-facilitated single abstraction plus verification by a second person, and (C traditional independent dual abstraction plus adjudication to ascertain the accuracy and efficiency of abstraction. Methods This is an online, randomized, three-arm, crossover trial. We will enroll 24 pairs of abstractors (i.e., sample size is 48 participants, each pair comprising one less and one more experienced abstractor. Pairs will be randomized to abstract data from six articles, two under each of the three approaches. Abstractors will complete pre-tested data abstraction forms using the Systematic Review Data Repository (SRDR, an online data abstraction system. The primary outcomes are (1 proportion of data items abstracted that constitute an error (compared with an answer key and (2 total time taken to complete abstraction (by two abstractors in the pair, including verification and/or adjudication. Discussion The DAA trial uses a practical design to test a novel software application as a tool to help improve the accuracy and efficiency of the data abstraction process during systematic reviews. Findings from the DAA trial will provide much-needed evidence to strengthen current recommendations for data

  1. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-03-28

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001.

  2. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  3. I Failed the edTPA

    Science.gov (United States)

    Kuranishi, Adam; Oyler, Celia

    2017-01-01

    In this article, co-written by a teacher and a professor, the authors examine possible explanations for why Adam (first author), a New York City public school special educator, failed the edTPA, a teacher performance assessment required by all candidates for state certification. Adam completed a yearlong teaching residency where he was the special…

  4. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  5. A bridge between two conventions on civil liability for nuclear damage: The Joint Protocol relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    Busekist, Otto von

    2006-01-01

    The adoption of the Joint Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and the NEA, was hailed as landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. The present article attempts to describe the history of the Joint Protocol during the many years it took to develop this link between the two conventions, to provide comment on its objectives and content, and to discuss some important questions related to its application

  6. A bridge between two Conventions on civil liability for nuclear damage: the Joint protocol Relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    Busekist, O. von.

    1989-01-01

    The adoption of the Joint-Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and NEA, was hailed as a landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. This article describes the history of the Joint Protocol during the many years it took to develop this link between the two Conventions, provides a comment on its objectives and content, and discusses some important questions related to its application. (NEA) [fr

  7. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  8. Method of detecting failed fuels

    International Nuclear Information System (INIS)

    Ishizaki, Hideaki; Suzumura, Takeshi.

    1982-01-01

    Purpose: To enable the settlement of the temperature of an adequate filling high temperature pure water by detecting the outlet temperature of a high temperature pure water filling tube to a fuel assembly to control the heating of the pure water and detecting the failed fuel due to the sampling of the pure water. Method: A temperature sensor is provided at a water tube connected to a sipping cap for filling high temperature pure water to detect the temperature of the high temperature pure water at the outlet of the tube, and the temperature is confirmed by a temperature indicator. A heater is controlled on the basis of this confirmation, an adequate high temperature pure water is filled in the fuel assembly, and the pure water is replaced with coolant. Then, it is sampled to settle the adequate temperature of the high temperature coolant used for detecting the failure of the fuel assembly. As a result, the sipping effect does not decrease, and the failed fuel can be precisely detected. (Yoshihara, H.)

  9. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  10. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna [es

  11. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010 [es

  12. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-09-14

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000.

  13. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  14. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  15. Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed in Vienna on 22 September 2005

  16. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-09-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  17. Pass-fail grading: laying the foundation for self-regulated learning.

    Science.gov (United States)

    White, Casey B; Fantone, Joseph C

    2010-10-01

    Traditionally, medical schools have tended to make assumptions that students will "automatically" engage in self-education effectively after graduation and subsequent training in residency and fellowships. In reality, the majority of medical graduates out in practice feel unprepared for learning on their own. Many medical schools are now adopting strategies and pedagogies to help students become self-regulating learners. Along with these changes in practices and pedagogy, many schools are eliminating a cornerstone of extrinsic motivation: discriminating grades. To study the effects of the switch from discriminating to pass-fail grading in the second year of medical school, we compared internal and external assessments and evaluations for a second-year class with a discriminating grading scale (Honors, High Pass, Pass, Fail) and for a second-year class with a pass-fail grading scale. Of the measures we compared (MCATs, GPAs, means on second-year examinations, USMLE Step 1 scores, residency placement, in which there were no statistically significant changes), the only statistically significant decreases (lower performance with pass fail) were found in two of the second-year courses. Performance in one other course also improved significantly. Pass-fail grading can meet several important intended outcomes, including "leveling the playing field" for incoming students with different academic backgrounds, reducing competition and fostering collaboration among members of a class, more time for extracurricular interests and personal activities. Pass-fail grading also reduces competition and supports collaboration, and fosters intrinsic motivation, which is key to self-regulated, lifelong learning.

  18. Non-invasive Assessments of Subjective and Objective Recovery Characteristics Following an Exhaustive Jump Protocol

    Science.gov (United States)

    Hohenauer, Erich; Clarys, Peter; Baeyens, Jean-Pierre; Clijsen, Ron

    2017-01-01

    Fast recovery after strenuous exercise is important in sports and is often studied via cryotherapy applications. Cryotherapy has a significant vasoconstrictive effect, which seems to be the leading factor in its effectiveness. The resulting enhanced recovery can be measured by using both objective and subjective parameters. Two commonly measured subjective characteristics of recovery are delayed-onset muscle soreness (DOMS) and ratings of perceived exertion (RPE). Two important objective recovery characteristics are countermovement jump (CMJ) performance and peak power output (PPO). Here, we provide a detailed protocol to induce muscular exhaustion of the frontal thighs with a self-paced, 3 x 30 countermovement jump protocol (30-s rest between each set). This randomized controlled trial protocol explains how to perform local cryotherapy cuff application (+ 8 °C for 20 min) and thermoneutral cuff application (+ 32 °C for 20 min) on both thighs as two possible post-exercise recovery modalities. Finally, we provide a non-invasive protocol to measure the effects of these two recovery modalities on subjective (i.e., DOMS of both frontal thighs and RPE) and objective recovery (i.e., CMJ and PPO) characteristics 24, 48, and 72 h post-application. The advantage of this method is that it provides a tool for researchers or coaches to induce muscular exhaustion, without using any expensive devices; to implement local cooling strategies; and to measure both subjective and objective recovery, without using invasive methods. Limitations of this protocol are that the 30 s rest period between sets is very short, and the cardiovascular demand is very high. Future studies may find the assessment of maximum voluntary contractions to be a more sensitive assessment of muscular exhaustion compared to CMJs. PMID:28654037

  19. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [fr

  20. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met. [es

  1. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [es

  2. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  3. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  4. Protocol Additional to the agreement between the Republic of Colombia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Colombia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 25 November 2004. It was signed in Vienna on 11 May 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 5 March 2009, the date on which the Agency received from Colombia written notification that Colombia's statutory and constitutional requirements for entry into force had been met

  5. Plasma Brightenings in a Failed Solar Filament Eruption

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y.; Ding, M. D., E-mail: yingli@nju.edu.cn [School of Astronomy and Space Science, Nanjing University, Nanjing 210023 (China)

    2017-03-20

    Failed filament eruptions are solar eruptions that are not associated with coronal mass ejections. In a failed filament eruption, the filament materials usually show some ascending and falling motions as well as generating bright EUV emissions. Here we report a failed filament eruption (SOL2016-07-22) that occurred in a quiet-Sun region observed by the Atmospheric Imaging Assembly on board the Solar Dynamics Observatory . In this event, the filament spreads out but gets confined by the surrounding magnetic field. When interacting with the ambient magnetic field, the filament material brightens up and flows along the magnetic field lines through the corona to the chromosphere. We find that some materials slide down along the lifting magnetic structure containing the filament and impact the chromosphere, and through kinetic energy dissipation, cause two ribbon-like brightenings in a wide temperature range. There is evidence suggesting that magnetic reconnection occurs between the filament magnetic structure and the surrounding magnetic fields where filament plasma is heated to coronal temperatures. In addition, thread-like brightenings show up on top of the erupting magnetic fields at low temperatures, which might be produced by an energy imbalance from a fast drop of radiative cooling due to plasma rarefaction. Thus, this single event of a failed filament eruption shows the existence of a variety of plasma brightenings that may be caused by completely different heating mechanisms.

  6. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  7. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  8. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  9. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-07

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met.

  10. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-08-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  11. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  12. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  13. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-02-23

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met.

  14. Revision surgery for failed thermal capsulorrhaphy.

    Science.gov (United States)

    Park, Hyung Bin; Yokota, Atsushi; Gill, Harpreet S; El Rassi, George; McFarland, Edward G

    2005-09-01

    With the failure of thermal capsulorrhaphy for shoulder instability, there have been concerns with capsular thinning and capsular necrosis affecting revision surgery. To report the findings at revision surgery for failed thermal capsulorrhaphy and to evaluate the technical effects on subsequent revision capsular plication. Case series; Level of evidence, 4. Fourteen patients underwent arthroscopic evaluation and open reconstruction for a failed thermal capsulorrhaphy. The cause of the failure, the quality of the capsule, and the ability to suture the capsule were recorded. The patients were evaluated at follow-up for failure, which was defined as recurrent subluxations or dislocations. The origin of the instability was traumatic (n = 6) or atraumatic (n = 8). At revision surgery in the traumatic group, 4 patients sustained failure of the Bankart repair with capsular laxity, and the others experienced capsular laxity alone. In the atraumatic group, all patients experienced capsular laxity as the cause of failure. Of the 14 patients, the capsule quality was judged to be thin in 5 patients and ablated in 1 patient. A glenoid-based capsular shift could be accomplished in all 14 patients. At follow-up (mean, 35.4 months; range, 22 to 48 months), 1 patient underwent revision surgery and 1 patient had a subluxation, resulting in a failure rate of 14%. Recurrent capsular laxity after failed thermal capsular shrinkage is common and frequently associated with capsular thinning. In most instances, the capsule quality does not appear to technically affect the revision procedure.

  15. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    International Nuclear Information System (INIS)

    2012-01-01

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met [es

  16. National intelligence estimates and the Failed State Index.

    Science.gov (United States)

    Voracek, Martin

    2013-10-01

    Across 177 countries around the world, the Failed State Index, a measure of state vulnerability, was reliably negatively associated with the estimates of national intelligence. Psychometric analysis of the Failed State Index, compounded of 12 social, economic, and political indicators, suggested factorial unidimensionality of this index. The observed correspondence of higher national intelligence figures to lower state vulnerability might arise through these two macro-level variables possibly being proxies of even more pervasive historical and societal background variables that affect both.

  17. Failed State and the Mandate of Peacekeeping Operations

    OpenAIRE

    Eka Nizmi, Yusnarida

    2011-01-01

    By 1990, Somalia had become a good example of what was becoming known as a “failed state”- a people without a government strong enough to govern the country or represent it in International organizations; a country whose poverty, disorganization, refugee flows, political instability, and random warfare had the potential to spread across borders and threaten the stability of other states and the peace of the region.[1] At the end of the cold war there were several such failed states in Africa,...

  18. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  19. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  20. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions.

    Science.gov (United States)

    Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-05-18

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described

  1. A method of failed fuel detection

    International Nuclear Information System (INIS)

    Uchida, Shunsuke; Utamura, Motoaki; Urata, Megumu.

    1976-01-01

    Object: To keep the coolant fed to a fuel assembly at a level below the temperature of existing coolant to detect a failed fuel with high accuracy without using a heater. Structure: When a coolant in a coolant pool disposed at the upper part of a reactor container is fed by a coolant feed system into a fuel assembly through a cap to fill therewith and exchange while forming a boundary layer between said coolant and the existing coolant, the temperature distribution of the feed coolant is heated by fuel rods so that the upper part is low whereas the lower part is high. Then, the lower coolant is upwardly moved by the agitating action and fission products leaked through a failed opening at the lower part of the fuel assembly and easily extracted by the sampling system. (Yoshino, Y.)

  2. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  3. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  4. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  5. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    "Senior scientists Marilena Aquino de Muro and Ralph Rapley have brought together an outstanding collection of time-tested protocols for designing and using genes probes in a wide variety of applications...

  6. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  7. Fail-safe reactivity compensation method for a nuclear reactor

    Science.gov (United States)

    Nygaard, Erik T.; Angelo, Peter L.; Aase, Scott B.

    2018-01-23

    The present invention relates generally to the field of compensation methods for nuclear reactors and, in particular to a method for fail-safe reactivity compensation in solution-type nuclear reactors. In one embodiment, the fail-safe reactivity compensation method of the present invention augments other control methods for a nuclear reactor. In still another embodiment, the fail-safe reactivity compensation method of the present invention permits one to control a nuclear reaction in a nuclear reactor through a method that does not rely on moving components into or out of a reactor core, nor does the method of the present invention rely on the constant repositioning of control rods within a nuclear reactor in order to maintain a critical state.

  8. Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System

    Directory of Open Access Journals (Sweden)

    Abhishek Joshi

    2017-01-01

    Full Text Available Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D topology. Various emerging application areas such as airborne networks and underwater wireless sensor networks are usually deployed using three-dimensional (3D network topology. In this paper, a static 3D cluster-based network topology has been proposed for airborne networks. A network protocol stack consisting of various protocols such as TDMA MAC and dynamic routing along with services such as time synchronization, Cluster Head rotation, and power level management has been proposed for this airborne network. The proposed protocol stack has been implemented on the hardware platform consisting of number of TelosB nodes. This 3D airborne network architecture can be used to measure Air Quality Index (AQI in an area. Various parameters of network such as energy consumption, Cluster Head rotation, time synchronization, and Packet Delivery Ratio (PDR have been analyzed. Detailed description of the implementation of the protocol stack along with results of implementation has been provided in this paper.

  9. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  10. Application of a high-level peracetic acid disinfection protocol to re-process antibiotic disinfected skin allografts.

    Science.gov (United States)

    Lomas, R J; Huang, Q; Pegg, D E; Kearney, J N

    2004-01-01

    Skin allografts, derived from cadaveric donors, are widely used for the treatment of burns and ulcers. Prior to use in clinical situations, these allografts are disinfected using a cocktail of antibiotics and then cryopreserved. Unfortunately, this antibiotic disinfection procedure fails to decontaminate a significant proportion and these contaminated grafts can not be used clinically. We have investigated whether it is possible to apply a second, more potent disinfection procedure to these contaminated grafts and effectively to re-process them for clinical use. Cadaveric skin grafts, treated with antibiotics and cryopreserved, were thawed and a peracetic acid (PAA) disinfection protocol applied. The grafts were then preserved in a high concentration of glycerol or propylene glycol, and properties thought to be essential for successful clinical performance assessed. The cytotoxicity of the grafts was assessed using both extract and contact assays; damage to the skin collagen was assessed using a collagenase susceptibility assay and the capacity of the grafts to elicit an inflammatory response in vitro was assessed by quantifying the production of the pro-inflammatory cytokine TNF-alpha by human peripheral blood mononuclear phagocytes. PAA disinfection, in conjunction with either glycerol or propylene glycol preservation, did not render the grafts cytotoxic, pro-inflammatory, or increase their susceptibility to collagenase digestion. The rates of penetration of glycerol and propylene glycol into the re-processed skin were comparable to those of fresh skin. This study has demonstrated that PAA disinfection combined with immersion in high concentrations of either glycerol or propylene glycol was an effective method for re-processing contaminated skin allografts, and may justify their clinical use.

  11. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  12. Standardized CT protocols and nomenclature: better, but not yet there

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sarabjeet; Kalra, Mannudeep K. [Harvard Medical School, Department of Radiology, Massachusetts General Hospital, Boston, MA (United States)

    2014-10-15

    Radiation dose associated with CT is an important safety concern in patient care, especially in children. Technical advancements in multidetector-row CT scanner technology offer several advantages for clinical applications; these advancements have considerably increased CT utilization and enhanced the complexity of CT scanning protocols. Furthermore there are several scan manufacturers spearheading these technical advancements, leading to different commercial names causing confusion among the users, especially at imaging sites with scanners from different vendors. Several scientific studies and the National Council on Radiation Protection and Measurements (NCRP) have shown variation in CT radiation doses for same body region and similar scanning protocols. Therefore there is a need for standardization of scanning protocols and nomenclature of scan parameters. The following material reviews the status and challenges in standardization of CT scanning and nomenclature. (orig.)

  13. Protocol Additional to the agreement between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 13 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of South Africa and the Agency, i.e. on 13 September 2002

  14. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  15. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  16. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003 [es

  17. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003 [fr

  18. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  19. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-10-29

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date.

  20. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  1. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  2. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  3. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  4. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  5. Failed fuel detector

    International Nuclear Information System (INIS)

    Onodera, Koichi.

    1981-01-01

    Purpose: To improve the reliability of detecting the failure of a fuel rod by imparting a wire disconnection detecting function to a central electrode at the center of a failure mode thereto. Constitution: A wire disconnection detecting terminal is provided at the terminal opposite to the signal output terminal of a central electrode in a failed fuel detector used for detecting the failure of a fuel rod in an atomic power plant using liquid metal as a coolant, and a voltage monitor for monitoring the terminal voltage is connected to the terminal. The disconnection of the central electrode is detected by the failure of the output of the voltage monitor, and an alarm is thus generated. (Aizawa, K.)

  6. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997 [es

  7. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  8. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997 [fr

  9. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  10. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  11. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  12. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  13. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  14. Protein crystallization with microseed matrix screening: application to human germline antibody Fabs

    International Nuclear Information System (INIS)

    Obmolova, Galina; Malia, Thomas J.; Teplyakov, Alexey; Sweet, Raymond W.; Gilliland, Gary L.

    2014-01-01

    The power of microseed matrix screening is demonstrated in the crystallization of a panel of antibody Fab fragments. The crystallization of 16 human antibody Fab fragments constructed from all pairs of four different heavy chains and four different light chains was enabled by employing microseed matrix screening (MMS). In initial screening, diffraction-quality crystals were obtained for only three Fabs, while many Fabs produced hits that required optimization. Application of MMS, using the initial screens and/or refinement screens, resulted in diffraction-quality crystals of these Fabs. Five Fabs that failed to give hits in the initial screen were crystallized by cross-seeding MMS followed by MMS optimization. The crystallization protocols and strategies that resulted in structure determination of all 16 Fabs are presented. These results illustrate the power of MMS and provide a basis for developing future strategies for macromolecular crystallization

  15. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  16. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  17. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2 and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC, advertisement-based MAC (A-MAC, Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC, and low-power real-time medium access control (LPR-MAC. The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  18. Method for detecting a failed fuel

    International Nuclear Information System (INIS)

    Utamura, Motoaki; Urata, Megumu; Uchida, Shunsuke.

    1976-01-01

    Purpose: To provide a method for the detection of failed fuel by pouring hot water, in which pouring speed of liquid to be poured and temperature of the liquid are controlled to prevent the leakage of the liquid. Constitution: The method comprises blocking the top of a fuel assembly arranged in coolant to stop a flow of coolant, pouring a liquid higher in temperature than that of coolant into the fuel assembly, sampling the liquid poured, and measuring the concentration of radioactivity of coolant already subjected to sampling to detect a failed fuel. At this time, controlling is made so that the pouring speed of the poured liquid is set to about 25 l/min, and an increased portion of temperature from the temperature of liquid to the temperature of coolant is set to a level less than about 15 0 C. (Furukawa, Y.)

  19. Fail-safe logic elements for use with reactor safety systems

    International Nuclear Information System (INIS)

    Bobis, J.P.; McDowell, W.P.

    1976-01-01

    A complete fail-safe trip circuit is described which utilizes fail-safe logic elements. The logic elements used are analog multipliers and active bandpass filter networks. These elements perform Boolean operations on a set of AC signals from the output of a reactor safety-channel trip comparator

  20. Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.

    Science.gov (United States)

    DeCanio, Stephen J; Norman, Catherine S

    2007-10-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.

  1. Application of Modbus communication protocol and float-point display in MCS51 system

    International Nuclear Information System (INIS)

    Kong Xiangcheng; Liu Shaozhen

    2010-01-01

    As its widely opening and easy performance, Modbus communication protocol has a great advantage in field bus using. Details are given on a method to implement Modbus communication protocol based on MCS51 system, and the advantage of uVision integrated environment. The design realizes Modbus RTU mode communication, meanwhile the problem of synchronization in communication is solved. And float-point operation and display are achieved by format print. All of this are carried out under uVision integrated environment. The result approves that the response ratio of Modbus communication is 100%. The design shows the advantage of uVision integrated environment and MCS51 system. And also gives solution to the occasion where communication interface and low cost are required. (authors)

  2. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  3. Systems with randomly failing repairable components

    DEFF Research Database (Denmark)

    Der Kiureghian, Armen; Ditlevsen, Ove Dalager; Song, Junho

    2005-01-01

    Closed-form expressions are derived for the steady-state availability, mean rate of failure, mean duration of downtime and reliability of a general system with randomly and independently failing repairable components. Component failures are assumed to be homogeneous Poisson events in time and rep...

  4. Comparison of Different Double Immunostaining Protocols for Paraffin Embedded Liver Tissue

    Directory of Open Access Journals (Sweden)

    Alexander Schütz

    1999-01-01

    Full Text Available Most of the double immunostaining protocols that have been introduced so far have been developed for application on fresh frozen material or based on different species antibodies. In liver tissue, general problems of double immunostaining techniques are further complicated by tissue‐specific difficulties, such as necrosis or high intracellular protein content. To assess a reliable double immunostaining protocol for archived, paraffin embedded liver tissue, different protocols based on the use of same species primary antibodies were evaluated in terms of sensitivity, specificity and non‐specific background staining in pathological liver specimens. We compared peroxidase–anti‐peroxidase, alkaline phosphatase–anti‐alkaline phosphatase (PAP/APAP, labelled‐avidin–biotin (LAB/LAB and digoxigenin–anti‐digoxigenin (dig–a‐dig/PAP techniques using different cytokeratin antibodies and an antibody against PCNA. Comparison of the double immunostaining techniques revealed a high sensitivity and specificity in all procedures. Sections, which were stained employing PAP/APAP‐technique, displayed a higher background staining compared to sections which were treated with the LAB/LAB or dig–a‐dig/PAP protocol. In contrast to the dig–a‐dig/PAP protocol, the LAB/LAB technique provides a better time/cost relationship. Therefore, we would like to recommend a modified LAB/LAB protocol for simultaneous detection of different antigens in archived liver tissue.

  5. Sensitivity Analysis of Per-Protocol Time-to-Event Treatment Efficacy in Randomized Clinical Trials

    Science.gov (United States)

    Gilbert, Peter B.; Shepherd, Bryan E.; Hudgens, Michael G.

    2013-01-01

    Summary Assessing per-protocol treatment effcacy on a time-to-event endpoint is a common objective of randomized clinical trials. The typical analysis uses the same method employed for the intention-to-treat analysis (e.g., standard survival analysis) applied to the subgroup meeting protocol adherence criteria. However, due to potential post-randomization selection bias, this analysis may mislead about treatment efficacy. Moreover, while there is extensive literature on methods for assessing causal treatment effects in compliers, these methods do not apply to a common class of trials where a) the primary objective compares survival curves, b) it is inconceivable to assign participants to be adherent and event-free before adherence is measured, and c) the exclusion restriction assumption fails to hold. HIV vaccine efficacy trials including the recent RV144 trial exemplify this class, because many primary endpoints (e.g., HIV infections) occur before adherence is measured, and nonadherent subjects who receive some of the planned immunizations may be partially protected. Therefore, we develop methods for assessing per-protocol treatment efficacy for this problem class, considering three causal estimands of interest. Because these estimands are not identifiable from the observable data, we develop nonparametric bounds and semiparametric sensitivity analysis methods that yield estimated ignorance and uncertainty intervals. The methods are applied to RV144. PMID:24187408

  6. Setting and validating the pass/fail score for the NBDHE.

    Science.gov (United States)

    Tsai, Tsung-Hsun; Dixon, Barbara Leatherman

    2013-04-01

    This report describes the overall process used for setting the pass/fail score for the National Board Dental Hygiene Examination (NBDHE). The Objective Standard Setting (OSS) method was used for setting the pass/fail score for the NBDHE. The OSS method requires a panel of experts to determine the criterion items and proportion of these items that minimally competent candidates would answer correctly, the percentage of mastery and the confidence level of the error band. A panel of 11 experts was selected by the Joint Commission on National Dental Examinations (Joint Commission). Panel members represented geographic distribution across the U.S. and had the following characteristics: full-time dental hygiene practitioners with experience in areas of preventive, periodontal, geriatric and special needs care, and full-time dental hygiene educators with experience in areas of scientific basis for dental hygiene practice, provision of clinical dental hygiene services and community health/research principles. Utilizing the expert panel's judgments, the pass/fail score was set and then the score scale was established using the Rasch measurement model. Statistical and psychometric analysis shows the actual failure rate and the OSS failure rate are reasonably consistent (2.4% vs. 2.8%). The analysis also showed the lowest error of measurement, an index of the precision at the pass/fail score point and that the highest reliability (0.97) are achieved at the pass/fail score point. The pass/fail score is a valid guide for making decisions about candidates for dental hygiene licensure. This new standard was reviewed and approved by the Joint Commission and was implemented beginning in 2011.

  7. Efficacy of repeated 5-fluorouracil needling for failing and failed filtering surgeries based on simple gonioscopic examination

    Directory of Open Access Journals (Sweden)

    Rashad MA

    2012-12-01

    Full Text Available Mohammad A RashadOphthalmology Department, Faculty of Medicine, Ain Shams University, Cairo, EgyptPurpose: To evaluate the success rate of a modified bleb needling technique in eyes with previous glaucoma surgery that had elevated intraocular pressure.Methods: A retrospective study of 24 eyes of 24 patients that underwent repeated bleb needling performed for failing and failed blebs on slit lamp with 5-fluorouracil (5-FU injections on demand. This was performed after gonioscopic examination to define levels of filtration block.Results: There was significant reduction of mean IOP from 36.91 mmHg to 14.73 mmHg at the final follow-up (P < 0.001. The overall success rate was 92%.Conclusion: Repeated needling with adjunctive 5-FU proved a highly effective, safe alternative to revive filtration surgery rather than another medication or surgery.Keywords: bleb, failure, 5-FU, needling, gonioscopy

  8. Gain maximization in a probabilistic entanglement protocol

    Science.gov (United States)

    di Lorenzo, Antonio; Esteves de Queiroz, Johnny Hebert

    Entanglement is a resource. We can therefore define gain as a monotonic function of entanglement G (E) . If a pair with entanglement E is produced with probability P, the net gain is N = PG (E) - (1 - P) C , where C is the cost of a failed attempt. We study a protocol where a pair of quantum systems is produced in a maximally entangled state ρm with probability Pm, while it is produced in a partially entangled state ρp with the complementary probability 1 -Pm . We mix a fraction w of the partially entangled pairs with the maximally entangled ones, i.e. we take the state to be ρ = (ρm + wUlocρpUloc+) / (1 + w) , where Uloc is an appropriate unitary local operation designed to maximize the entanglement of ρ. This procedure on one hand reduces the entanglement E, and hence the gain, but on the other hand it increases the probability of success to P =Pm + w (1 -Pm) , therefore the net gain N may increase. There may be hence, a priori, an optimal value for w, the fraction of failed attempts that we mix in. We show that, in the hypothesis of a linear gain G (E) = E , even assuming a vanishing cost C -> 0 , the net gain N is increasing with w, therefore the best strategy is to always mix the partially entangled states. Work supported by CNPq, Conselho Nacional de Desenvolvimento Científico e Tecnológico, proc. 311288/2014-6, and by FAPEMIG, Fundação de Amparo à Pesquisa de Minas Gerais, proc. IC-FAPEMIG2016-0269 and PPM-00607-16.

  9. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria [es

  10. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  11. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  12. Very Preterm Infants Failing CPAP Show Signs of Fatigue Immediately after Birth

    Science.gov (United States)

    Siew, Melissa L.; van Vonderen, Jeroen J.; Hooper, Stuart B.; te Pas, Arjan B.

    2015-01-01

    Objective To investigate the differences in breathing pattern and effort in infants at birth who failed or succeeded on continuous positive airway pressure (CPAP) during the first 48 hours after birth. Methods Respiratory function recordings of 32 preterm infants were reviewed of which 15 infants with a gestational age of 28.6 (0.7) weeks failed CPAP and 17 infants with a GA of 30.1 (0.4) weeks did not fail CPAP. Frequency, duration and tidal volumes (VT) of expiratory holds (EHs), peak inspiratory flows, CPAP-level and FiO2-levels were analysed. Results EH incidence increased CPAP-fail and CPAP-success infants. At 9-12 minutes, CPAP-fail infants more frequently used smaller VTs, 0-9 ml/kg and required higher peak inspiratory flows. However, CPAP-success infants often used large VTs (>9 ml/kg) with higher peak inspiratory flows than CPAP-fail infants (71.8 ± 15.8 vs. 15.5 ± 5.2 ml/kg.s, p CPAP-fail infants required higher FiO2 (0.31 ± 0.03 vs. 0.21 ± 0.01), higher CPAP pressures (6.62 ± 0.3 vs. 5.67 ± 0.26 cmH2O) and more positive pressure-delivered breaths (45 ± 12 vs. 19 ± 9%) (p CPAP-fail infants more commonly used lower VTs and required higher peak inspiratory flow rates while receiving greater respiratory support. VT was less variable and larger VT was infrequently used reflecting early signs of fatigue. PMID:26052947

  13. Pictorial essay: Role of ultrasound in failed carpal tunnel decompression

    Directory of Open Access Journals (Sweden)

    Rajesh Botchu

    2012-01-01

    Full Text Available USG has been used for the diagnosis of carpal tunnel syndrome. Scarring and incomplete decompression are the main causes for persistence or recurrence of symptoms. We performed a retrospective study to assess the role of ultrasound in failed carpal tunnel decompression. Of 422 USG studies of the wrist performed at our center over the last 5 years, 14 were for failed carpal tunnel decompression. Scarring was noted in three patients, incomplete decompression in two patients, synovitis in one patient, and an anomalous muscle belly in one patient. No abnormality was detected in seven patients. We present a pictorial review of USG findings in failed carpal tunnel decompression.

  14. Pictorial essay: Role of ultrasound in failed carpal tunnel decompression.

    Science.gov (United States)

    Botchu, Rajesh; Khan, Aman; Jeyapalan, Kanagaratnam

    2012-01-01

    USG has been used for the diagnosis of carpal tunnel syndrome. Scarring and incomplete decompression are the main causes for persistence or recurrence of symptoms. We performed a retrospective study to assess the role of ultrasound in failed carpal tunnel decompression. Of 422 USG studies of the wrist performed at our center over the last 5 years, 14 were for failed carpal tunnel decompression. Scarring was noted in three patients, incomplete decompression in two patients, synovitis in one patient, and an anomalous muscle belly in one patient. No abnormality was detected in seven patients. We present a pictorial review of USG findings in failed carpal tunnel decompression.

  15. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  16. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P 2015 statement

    Directory of Open Access Journals (Sweden)

    Mireia Estarli

    2016-02-01

    Full Text Available Systematic reviews should build on a protocol that describes the rationale, hypothesis, and planned methods of the review; few reviews report whether a protocol exists. Detailed, well-described protocols can facilitate the understanding and appraisal of the review methods, as well as the detection of modifications to methods and selective reporting in completed reviews. We describe the development of a reporting guideline, the Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015 (PRISMA-P 2015. PRISMA-P consists of a 17-item checklist intended to facilitate the preparation and reporting of a robust protocol for the systematic review. Funders and those commissioning reviews might consider mandating the use of the checklist to facilitate the submission of relevant protocol information in funding applications. Similarly, peer reviewers and editors can use the guidance to gauge the completeness and transparency of a systematic review protocol submitted for publication in a journal or other medium. Translation with permission of the authors. The original authors have not revised and verified the Spanish translation, and they do not necessarily endorse it.

  17. Detection device for the failed position in fuels

    International Nuclear Information System (INIS)

    Tokunaga, Kensuke; Nomura, Teiji; Hiruta, Koji

    1985-01-01

    Purpose: To detect the failed position of a fuel assembly with ease and safety. Constitution: A fuel assembly is tightly closed in a sipper tube equipped with a gas supply tube and a gas exhaust tube at the upper portion and a purified water injection tube and a draining tube at the lower end. Then, water in the sipper tube is drained to the lower portion of the fuel assembly by the pressure of gases while opening the gas supply tube and the draining tube, and closing the exhaust tube and the injection tube. Then, after closing the gas supply tube and the draining tube while opening theexhaust tube and the injection tube, purified water is injected into the sipper tube from the injection tube to an optional height till the fuel assembly is immersed. Then, after leaving for a predetermined of time, water is sampled and the radioactive material density therein is measured. By changing the injection level of the purified water, since the radioactive material density changes at the failed position, the failed position can be detected with ease. (Sekiya, K.)

  18. Application of biodegradation screening protocol to contaminated soils from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Smith, J.R.; Nakles, D.V.; Cushey, M.A.; Morgan, D.J.; Linz, D.G.

    1990-01-01

    Bioremediation (i.e., land treatment) has been demonstrated to be a viable option for treating a variety of soils contamianted with organics. Conventional treatability studies utilize soil microcosm experiments to evaluate the potential for bioremediation of specific contaminated soils. Unfortunately, soil microcosms take from 4- to 6-months to complete and do not fully exploit the current understanding of the bioremediation process. This paper describes a treatability protocol that investigates underlying mechanisms and can be completed in 2- to 3-months. It is believed that soil bioremediation is governed by the sequential processes of contanate desorption from the soil into the aqueous phase and subsequent oxidation by microorganisms. The relative importance of each process depends upon the contaminant and soil. Accordingly, the treatability protocol has three steps. In the first step, tests are performed to determine soil characteristics. In the second step, tests are performed to characterize the desorption of contaminants from the soil. In the third step, the potential for biological oxidaiton is evaluated with a soil-water slurry reactor that maximizes desorption and provides an optimum environment for microbial growth. This paper provides a thorough discussion of the laboratory protocol including the primary theoretical tenets which serve as its basis. Preliminary procedures and results are presented for soils contaminated with manufactured gas plant (MGP) wastes. Particular attention is focused on biodegradation of polynuclear aromatic hydrocarbons (PAHs)

  19. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  20. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000.