WorldWideScience

Sample records for applicable protocol fails

  1. Apyrase treatment of myocardial infarction according to a clinically applicable protocol fails to reduce myocardial injury in a porcine model

    Directory of Open Access Journals (Sweden)

    Otto Andreas

    2010-01-01

    Full Text Available Abstract Background Ectonucleotidase dependent adenosine generation has been implicated in preconditioning related cardioprotection against ischemia-reperfusion injury, and treatment with a soluble ectonucleotidase has been shown to reduce myocardial infarct size (IS when applied prior to induction of ischemia. However, ectonucleotidase treatment according to a clinically applicable protocol, with administration only after induction of ischemia, has not previously been evaluated. We therefore investigated if treatment with the ectonucleotidase apyrase, according to a clinically applicable protocol, would reduce IS and microvascular obstruction (MO in a large animal model. Methods A percutaneous coronary intervention balloon was inflated in the left anterior descending artery for 40 min, in 16 anesthetized pigs (40-50 kg. The pigs were randomized to 40 min of 1 ml/min intracoronary infusion of apyrase (10 U/ml, n = 8 or saline (0.9 mg/ml, n = 8, twenty minutes after balloon inflation. Area at risk (AAR was evaluated by ex vivo SPECT. IS and MO were evaluated by ex vivo MRI. Results No differences were observed between the apyrase group and saline group with respect to IS/AAR (75.7 ± 4.2% vs 69.4 ± 5.0%, p = NS or MO (10.7 ± 4.8% vs 11.4 ± 4.8%, p = NS, but apyrase prolonged the post-ischemic reactive hyperemia. Conclusion Apyrase treatment according to a clinically applicable protocol, with administration of apyrase after induction of ischemia, does not reduce myocardial infarct size or microvascular obstruction.

  2. Recommended protocol for failed back surgery syndrome

    Directory of Open Access Journals (Sweden)

    Fakhr Tabatabaei SA

    1996-06-01

    Full Text Available Failed back surgery syndrome (FBSS is many a times an intractable problem confronted in patients with surgical disease of lumbar spine and at the same time is a pressing problem for the physicians as well. This clinical entity is defined as continuation of pain in the lumbar region and lower extremities following surgery of the lumbar spine. Knowledge of the etiological factors and their prevention is the best line of treatment to overcome the evolution of this syndrome. During this study, which was conducted in Imam Khomeini hospital Tehran from the year 1989 till 1990, 43 out of 114 patients developed "FBSS". 23 cases responded to conservative treatment and psychotherapy whereas medical treatment failed to achieve fruitful results in the rest. The latter underwent extensive radiological investigations and repeat surgery. According to this study, we recommend that in the initial management of these patients. The surgeon should observe the dictum of "5-mis" to overcome and minimize the "FBSS" entity

  3. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  4. Application Protocol Design for Collaborative Learning

    Directory of Open Access Journals (Sweden)

    Joung-Souk Sung

    2009-12-01

    Full Text Available This presentation will describe the effort to construct an effective educational support environment and to develop meaningful educational applications, This system is a framework supporting interactive collaboration which enables both teachers and students to interact in real-time from remote sites. The purpose of this collaboration is to bring interactive multimedia learning in real-time. In order to induce collaborative learning, this paperproposes protocol design process that shares knowledge awareness information for learning environments. The protocol helps learner to mediate and recognize collaborators in the shared knowledge space. We are developing an open-ended collaborative learning supportsystem, which is called prototype system for protocol design, and facilities to share individual knowledge and to learn through collaboration. This system architecture can be viewed asdivided in four logical parts: the infrastructure, the service functions, the advanced service functions and the application. The session management is creates/destroys the sessions and performs the functions controlling the QOS by detaching the network load. Session manager include: session control, floor control, media instance control, packet interpreter, event interpreter, media server instance, media interface, network interface private applicationinterface and media server control.

  5. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  6. Feature Analysis of STEP Application Protocol and its Application

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    This paper uses semantic data modelling and CAD/CAPP/CAM integration to analyze the features defined in the STEP AP214, its characteristics of definition and distribution, and its influence on the complexity of CAD/CAPP/CAM application integration. A framework is developed for applications of CAD/CAPP/CAM integration based on the STEP to reduce the complexity of integration implementation. Two application program interfaces (API), namely, application protocol API and application API, are developed. The frameworks hierarchy structure and the application program interfaces between the layers make the integration of applications easier.

  7. The Research and Application Design of SDL Protocol

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Aiming at overcoming the disadvantages in the Simple Data Link(SDL) protocol, we study and modify the protocol mechanism, which enhances the flexibility in carrying the packets of various network layer protocols and improves the ability to correct errors. We research the error check and error correction of CRC and the application of MPLS labels in the SDL protocol. Furthermore, we provide a method of CRC correction and application of MPLS labels in the SDL protocol. Finally, we present a scheme of realizing the SDL protocol.

  8. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  9. OAuth protocol for CERN Web Applications

    OpenAIRE

    Kleszcz, Emil; Rodriguez Fernandez, Luis; Marescaux, Nicolas Bernard

    2016-01-01

    Project Specification The CERN Authentication service has recently increased his offer of SSO protocols/frameworks with OAuth2 standard. The purpose of the work is to explain the need for an authorization standard and explain how does OAuth2 protocol addresses our requirements. OAuth is an open standard for authorization which provides a secure access to server resources that belongs to a user. As a wide known and relatively new standard (2012) is used by big players in the industry a...

  10. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  11. Smart environments technology, protocols and applications

    CERN Document Server

    Cook, Diane

    2004-01-01

    Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.

  12. Secure communication protocol for mobile multimedia applications

    OpenAIRE

    Komninos, N.; Honary, B.; Darnell, M.

    2000-01-01

    Data transmission over wireless communication networks is increasing rapidly and security has become a very important issue. The main considerations of secure communication systems are authentication, key distribution, and data transfer. This paper describes a secure communication protocol (SCP), which provides privacy and data integrity for end-to-end data transmission over wireless communication systems.

  13. Failing Failed States

    DEFF Research Database (Denmark)

    Holm, Hans-Henrik

    2002-01-01

    When states are failing, when basic state functions are no longer carried out, and when people have no security, humanitarian crises erupt. In confronting this problem, the stronger states have followed an ad hoc policy of intervention and aid. In some cases, humanitarian disasters have resulted...

  14. Extensible Authentication Protocol Overview and Its Applications

    Science.gov (United States)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  15. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  16. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  17. On the design of application protocols

    NARCIS (Netherlands)

    Sinderen, van Marten Jelle

    1995-01-01

    In the last decades, much effort has been spent on the design and provision of sophisticated communication infrastructures. The development of end-user oriented distributed system applications, leaning on top of these communication infrastructures, so far has attracted little attention. This is regr

  18. Virtual reality applications to agoraphobia: a protocol.

    Science.gov (United States)

    Cárdenas, Georgina; Muñoz, Sandra; González, Maribel; Uribarren, Guillermo

    2006-04-01

    Recently, educators and instructional designers have focused on the development and implementation of virtual learning environments that effectively combine theoretical and applied knowledge to teach university students. One of the trusts of the Psychology Virtual Teaching Laboratory in collaboration with the IXTLI observatory is to develop dissemination programs to promote the insertion of virtual reality (VR) technologies applied to rehabilitation in their clinical practice. This paper describes the development of (1) agoraphobia VR learning objects to be use as a teaching support tools in class and (2) a multimedia teaching program that incorporate digital video and VR scenarios address to students in the field of mental health. Promotion among professors and students about the use of this technology will allow us to initiate research in our country as well as to validate contextualized applications for our culture, therefore contributing with new advances in this field. PMID:16640489

  19. Network Coding Protocols for Data Gathering Applications

    DEFF Research Database (Denmark)

    Nistor, Maricica; Roetter, Daniel Enrique Lucani; Barros, João

    2015-01-01

    Tunable sparse network coding (TSNC) with various sparsity levels of the coded packets and different feedback mechanisms is analysed in the context of data gathering applications in multi-hop networks. The goal is to minimize the completion time, i.e., the total time required to collect all data...... packets from the nodes while maintaining the per packet overhead at a minimum. We exploit two types of feedback, (1) the explicit feedback sent deliberately between nodes and (2) the implicit feedback emerged when a node hears its neighbour transmissions. Analytical bounds for a line network are derived...... using a fluid model, which is valid for any field size, various sparsity levels and the aforesaid feedback mechanisms. Our results show that implicit and explicit feedback mechanisms are instrumental in reducing the completion time for sparse codes....

  20. Hopcount in the NICE Application Layer Multicast Protocol

    NARCIS (Netherlands)

    Hong Tang; Janic, M.; Xiaoming Zhou

    2006-01-01

    Application Layer (AL) multicast protocols emerged, and in large number, as a response to the slow deployment of IP multicast. However, the gain of different AL multicast mechanisms, in terms of resources consumption over unicast, is questionable. In this paper, we investigate the efficiency of AL m

  1. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  2. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  3. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  4. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  5. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  6. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Science.gov (United States)

    Carvajal-Flórez, Alvaro; Barbosa-Lis, Diana María; Zapata-Noreña, Oscar Arturo; Marín-Velásquez, Julissa Andrea; Afanador-Bayona, Sergio Andrés

    2016-01-01

    ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS) of the American Board of Orthodontics (ABO). Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG) consisted of 17 patients (19.88 ± 4.4 years old) treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old) selected by stratified randomization without finishing intervention (CG). Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048), respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8) (p = 0.009) and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6) (p = 0.007). Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8) (p = 0.62) and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9) (p = 0.65). Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system. PMID:27275620

  7. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Directory of Open Access Journals (Sweden)

    Alvaro Carvajal-Flórez

    2016-04-01

    Full Text Available ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS of the American Board of Orthodontics (ABO. Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG consisted of 17 patients (19.88 ± 4.4 years old treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old selected by stratified randomization without finishing intervention (CG. Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048, respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8 (p = 0.009 and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6 (p = 0.007. Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8 (p = 0.62 and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9 (p = 0.65. Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system.

  8. Is the pass/fail system applicable to a medical school in Korea?

    Science.gov (United States)

    Kim, Mee Young

    2007-01-01

    To determine whether a pass/fail system is more appropriate for medical education instead of a grade-based system, a survey of medical students and faculty members of Hallym University, Korea, was taken. A questionnaire was delivered to 54 junior students and 36 faculty members from a medical school in Korea and analyzed. Of these participants, 37.7% of students and 36.1% of faculty agreed to the pass/fail system, while 28.3% of students and 52.8% of faculty objected to it. The most frequent reason for objection was the potential decrease in learning achievement. A pass/fail system should be considered after persuasion of the students and faculty to think positively of this system.

  9. Link-Aware Nice Application Level Multicast Protocol

    Directory of Open Access Journals (Sweden)

    Dina Helal

    2014-06-01

    Full Text Available Multicast is one of the most efficient ways to distribute data to multiple users. There are different types of Multicast such as IP Multicast, Overlay Multicast, and Application Layer Multicast (ALM. In this paper, we present a link-aware Application Layer (ALM Multicast algorithm. Our proposed algorithm, Link Aware-NICE (LA-NICE [1], is an enhanced version of the NICE protocol [2]. LA-NICE protocol uses the variations of bandwidth or capacity in communication links to improve multicast message delivery and minimize end-to-end delay. OMNeT++ simulation frame work [3] was used to evaluate LA-NICE. The evaluation is done through a comparison between LA-NICE and NICE. The simulation results showed that LA-NICE produces an increased percentage of success ful message delivery ranging from 2% to 10% compared to NICE. Also, LA-NICE has less average delay and less average message hop count than NICE which reduces the overall latency of message delivery.

  10. Is the Pass/Fail System Applicable to a Medical School in Korea?

    OpenAIRE

    Mee Young Kim

    2007-01-01

    To determine whether a pass/fail system is more appropriate for medical education instead of a grade-based system, a survey of medical students and faculty members of Hallym University, Korea, was taken. A questionnaire was delivered to 54 junior students and 36 faculty members from a medical school in Korea and analyzed. Of these participants, 37.7% of students and 36.1% of faculty agreed to the pass/fail system, while 28.3% of students and 52.8% of faculty objected to it. The most frequent ...

  11. Reputation-based Incentive Protocols in Crowdsourcing Applications

    CERN Document Server

    Zhang, Yu

    2011-01-01

    Crowdsourcing websites (e.g. Yahoo! Answers, Amazon Mechanical Turk, and etc.) emerged in recent years that allow requesters from all around the world to post tasks and seek help from an equally global pool of workers. However, intrinsic incentive problems reside in crowdsourcing applications as workers and requester are selfish and aim to strategically maximize their own benefit. In this paper, we propose to provide incentives for workers to exert effort using a novel game-theoretic model based on repeated games. As there is always a gap in the social welfare between the non-cooperative equilibria emerging when workers pursue their self-interests and the desirable Pareto efficient outcome, we propose a novel class of incentive protocols based on social norms which integrates reputation mechanisms into the existing pricing schemes currently implemented on crowdsourcing websites, in order to improve the performance of the non-cooperative equilibria emerging in such applications. We first formulate the exchange...

  12. Scalable Hybrid Speech Codec for Voice over Internet Protocol Applications

    Directory of Open Access Journals (Sweden)

    Manas Ray

    2016-04-01

    Full Text Available With the advent of various web-based applications and the fourth generation (4G access technology, there has been an exponential growth in the demand of multimedia service delivery along with speech signals in a voice over internet protocol (VoIP setup. Need is felt to fine-tune the conventional speech codecs deployed to cater to the modern environment. This fine-tuning can be achieved by further compressing the speech signal and to utilize the available bandwidth to deliver other services. This paper presents a scalable -hybrid model of speech codec using ITU-T G.729 and db10 wavelet. The codec addresses the problem of compression of speech signal in VoIP setup. The performance comparison of the codec with the standard codec has been performed by statistical analysis of subjective, objective and quantifiable parameters of quality desirable from the codec deployed in VoIP platforms.

  13. Failing Decision

    DEFF Research Database (Denmark)

    Knudsen, Morten

    2014-01-01

    Recently the Danish subway trains have begun to announce “on time” when they arrive at a station on time. This action reflects a worrying acceptance of the normality of failure. If trains were generally expected to be on time, there would be no reason to – triumphantly – announce it. This chapter...... as a controlled cost for achieving organizational goals. Decisions must fail so the organization can succeed. This chapter uses two cases to elaborate on these ideas. By way of introduction, I will reflect on the notion of ‘failing decisions’ within organization and decision theory. This chapter is also propelled...

  14. Fail forward

    DEFF Research Database (Denmark)

    Brix, Jacob

    2015-01-01

    Almost three quarters of all innovation projects disappoint or fail. Instead of ‘wasting’ human and financial resources on energy projects that end up being terminated or ineffectual, this study offers a potential antidote coined the ‘Origins of Failure in Energy Innovation’ (OFEI) model. Based o...

  15. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  16. Selection application for platforms and security protocols suitable for wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Moeller, S; Newe, T [Electronic and Computer Engineering, University of Limerick (Ireland); Lochmann, S, E-mail: stefan.moeller@ul.i [Fachbereich Elektrotechnik und Informatik, Hochschule Wismar (Germany)

    2009-07-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  17. Application Framework with Abstractions for Protocol and Agent Role

    DEFF Research Database (Denmark)

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent...

  18. Leakproof secret sharing protocols with applications to group identification scheme

    Institute of Scientific and Technical Information of China (English)

    TANG ChunMing; GAO ShuHong

    2012-01-01

    In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret K.In the reconstruction process,the individual shares and the secret key K are revealed,hence K is shared once only. In this paper,we firstly give the definition of leakproof secret sharing scheme which is composed of a distribution protocol and a proof protocol,then propose two leakproof secret sharing protocols,a computationally secure protocol and an information-theoretically secure protocol.In our protocols,t or more participants can jointly prove that they hold the secret K by using a multi-prover zero-knowledge argument of knowledge.As a result,the secret K will be shared for as many times as desired.Furthermore,each participant can detect the dealer in the distribution protocol from cheating,and any verifier can prevent non-qualified set of participants in proof protocol from cheating.As an example of the practical impact of our work we use our techniques to construct group identification schemes with zero-knowledge.

  19. Validation of Context Based Service Discovery Protocol for Ubiquitous Applications

    Directory of Open Access Journals (Sweden)

    Anandi Giridharan

    2012-11-01

    Full Text Available Service Discovery Protocol (SDP is important in ubiquitous applications, where a large number of devicesand software components collaborate unobtrusively and provide numerous services without userintervention. Existing service discovery schemes use a service matching process in order to offer services ofinterest to the users. Potentially, the context information of the users and surrounding environment can beused to improve the quality of service matching. We propose a C-IOB (Context- Information, Observationand Belief based service discovery model, which deals with the above challenges by processing the contextinformation and by formulating the beliefs based on the basis of observations. With these formulated beliefsthe required services will be provided to the users. In this work, we present an approach for automatedvalidation of C-IOB based service discovery model in a typical ubiquitous museum environment, where theexternal behavior of the system can be predicted and compared to a model of expected behavior from theoriginal requirements. Formal specification using SDL (Specification and Description Language basedsystem has been used to conduct verification and validation of the system. The purpose of this framework isto provide a formal basis for their performance evaluation and behavioral study of the SDP.

  20. Rate Compatible Protocol for Information Reconciliation: An application to QKD

    CERN Document Server

    Elkouss, David; Lancho, Daniel; Martin, Vicente

    2010-01-01

    Information Reconciliation is a mechanism that allows to weed out the discrepancies between two correlated variables. It is an essential component in every key agreement protocol where the key has to be transmitted through a noisy channel. The typical case is in the satellite scenario described by Maurer in the early 90's. Recently the need has arisen in relation with Quantum Key Distribution (QKD) protocols, where it is very important not to reveal unnecessary information in order to maximize the shared key length. In this paper we present an information reconciliation protocol based on a rate compatible construction of Low Density Parity Check codes. Our protocol improves the efficiency of the reconciliation for the whole range of error rates in the discrete variable QKD context. Its adaptability together with its low interactivity makes it specially well suited for QKD reconciliation.

  1. Why electricity deregulation is likely to fail: An explanation with an application to Israel

    Energy Technology Data Exchange (ETDEWEB)

    Tishler, Asher; Woo, Chi-Keung

    2005-12-15

    In this paper we contend that electricity deregulation likely fails because of a fundamental, but so far ignored, reason. In particular, a deregulated electricity market cannot have too many producers because they will not be able to recover their investment costs. Nor can it have too few producers because the resulting market price will likely exceed the regulated rate. If constrained by the financial viability of privately owned generators and an overarching goal of unregulated market price not exceeding the regulated rate, the set of feasible numbers of producers in the competitive market can be very small, and at times empty. Our theoretical prediction applies to deregulation of other industries with large fixed and sunk costs (e.g., gas transportation, electricity transmission and distribution, local telecom networks, ports, railways, etc.). We show that a large improvement in the operational efficiency of the deregulated industry is a necessary condition for a successful deregulation of the industry. Unfortunately, operation improvement in electricity generation is limited because fuel (e.g., coal, oil, natural gas, and liquefied natural gas) and generation equipment (e.g., turbines, transformers, and cables), which constitute about 80% of the total cost of electricity generation, are commodities traded in a competitive world market. Thus, cost savings due to deregulation in the electricity generation market mainly come from efficiency improvement in capacity investment and variable input use of labor and O and M. Unless the regulated integrated utility has been investing inefficiently in surplus capacity, such savings, mainly in labor and O and M, are unlikely to produce more than a 10% reduction in total generation cost. For this reason and based on the experience to date, we caution against deregulation in regions that currently have a regulated electricity sector (e.g., China, India, Hong Kong, Israel, Africa, and many parts of North America). Our

  2. Why electricity deregulation is likely to fail: An explanation with an application to Israel

    International Nuclear Information System (INIS)

    In this paper we contend that electricity deregulation likely fails because of a fundamental, but so far ignored, reason. In particular, a deregulated electricity market cannot have too many producers because they will not be able to recover their investment costs. Nor can it have too few producers because the resulting market price will likely exceed the regulated rate. If constrained by the financial viability of privately owned generators and an overarching goal of unregulated market price not exceeding the regulated rate, the set of feasible numbers of producers in the competitive market can be very small, and at times empty. Our theoretical prediction applies to deregulation of other industries with large fixed and sunk costs (e.g., gas transportation, electricity transmission and distribution, local telecom networks, ports, railways, etc.). We show that a large improvement in the operational efficiency of the deregulated industry is a necessary condition for a successful deregulation of the industry. Unfortunately, operation improvement in electricity generation is limited because fuel (e.g., coal, oil, natural gas, and liquefied natural gas) and generation equipment (e.g., turbines, transformers, and cables), which constitute about 80% of the total cost of electricity generation, are commodities traded in a competitive world market. Thus, cost savings due to deregulation in the electricity generation market mainly come from efficiency improvement in capacity investment and variable input use of labor and O and M. Unless the regulated integrated utility has been investing inefficiently in surplus capacity, such savings, mainly in labor and O and M, are unlikely to produce more than a 10% reduction in total generation cost. For this reason and based on the experience to date, we caution against deregulation in regions that currently have a regulated electricity sector (e.g., China, India, Hong Kong, Israel, Africa, and many parts of North America). Our

  3. Though active on RINm5F insulinoma cells and cultured pancreatic islets, recombinant IL-22 fails to modulate cytotoxicity and disease in a protocol of streptozotocin-induced experimental diabetes.

    Directory of Open Access Journals (Sweden)

    Anika eBerner

    2016-01-01

    Full Text Available Interleukin (IL-22 is a cytokine displaying tissue protective and pro-regenerative functions in various preclinical disease models. Anti-bacterial, pro-proliferative, and anti-apoptotic properties mediated by activation of the transcription factor signal transducer and activator of transcription (STAT-3 are key to biological functions of this IL-10 family member. Herein, we introduce RINm5F insulinoma cells as rat ß-cell line that, under the influence of IL-22, displays activation of STAT3 with induction of its downstream gene targets Socs3, Bcl3, and Reg3ß. In addition, IL-22 also activates STAT1 in this cell type. To refine those observations, IL-22 biological activity was evaluated using ex vivo cultivated murine pancreatic islets. In accord with data on RINm5F cells, islet exposure to IL-22 activated STAT3 and upregulation of STAT3-inducible Socs3, Bcl3, and STEAP4 was evident under those conditions. As these observations supported the hypothesis that IL-22 may exert protective functions in toxic ß-cell injury, application of IL-22 was investigated in murine multiple-low-dose streptozotocin (STZ-induced diabetes. For that purpose, recombinant IL-22 was administered thrice either immediately before and at disease onset (at d4, d6, d8 or closely thereafter (at d8, d10, d12. These two IL-22-treatment periods coincide with two early peaks of ß-cell injury detectable in this model. Notably, none of the two IL-22-treatment strategies affected diabetes incidence or blood glucose levels in STZ-treated mice. Moreover, pathological changes in islet morphology analyzed 28 days after disease induction were not ameliorated by IL-22 administration. Taken together, despite being active on rat RINm5F insulinoma cells and murine pancreatic islets, recombinant IL-22 fails to protect pancreatic ß-cells in the tested protocols from toxic effects of STZ and thus is unable to ameliorate disease in the widely used model of STZ-induced diabetes.

  4. Clinical outcomes of modified long protocol used in patients who failed in first cycle with antagonist protocol%改良长方案在初次拮抗剂方案助孕治疗失败患者中的应用

    Institute of Scientific and Technical Information of China (English)

    胡玉琴; 蔡嘉力; 刘兰兰; 沙爱国; 任建枝; 李萍

    2014-01-01

    Objective:To compare IVF outcomes with modified long protocol and an-tagonist protocol in women who failed in their first IVF attempt with antagonist protocol. Meth-ods:A total of 169 patients failed in first cycle with antagonist protocol who underwent the sec-ondary cycles were retrospectively analyzed. Patients were divided into two groups:the study group included 130 patients receiving modified long protocol and the control group included 39 patients receiving flexible antagonist protocol. Results:There was no significant difference in general characteristics between the two groups(P>0. 05). E2 level on HCG injection day,Gn duration and dosage in study group were higher than those in control group. The LH level on HCG injection day was significantly lower than the control group ( P0.05)。研究组的注射HCG日E2值、Gn用药时间和Gn剂量均显著高于对照组(P<0.05),注射HCG日LH值显著低于对照组(P<0.05)。研究组的临床妊娠率、种植率及活产率分别为55.2%、36.4%和46.4%,均显著高于对照组(27.3%、22.0%和21.2%)(P<0.05)。结论:初次拮抗剂方案失败行再次助孕治疗的患者中,改良长方案可能通过改善子宫内膜的容受性,获得了较拮抗剂方案更好的妊娠结局。

  5. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  6. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  7. Application of Bousinesq's and Westergaard's formulae in analysing foundation stress distribution for a failed telecommunication mast

    CERN Document Server

    Ojedokun, Olalekan Yinka

    2012-01-01

    The concurrent foundation failure of telecommunication masts in Nigeria and all over the world which endanger the lives and properties of residents situated within the fall distance of the telecommunication mast are a thing of great concern. In this study, a GSM mast that underwent foundation failure at Ibadan, Oyo State, Nigeria was critically examined with a view to providing engineering solution. The soil investigation at the global system for mobile communications (GSM) telecommunication tower comprised of laboratory tests: sieve analysis, Atterberg limits and moisture content tests were carried out on the soil samples obtained while Dutch cone penetrometer test was performed on the site to a depth of refusal to determine the allowable bearing pressure at various depths of the soil. The application of Boussineq's and Westergard's formulae for point loads using Java programme to simulate and compute the stress distribution at various predetermined depths showed the stress distribution pattern beneath the f...

  8. Protocol data dependencies with an application in conformance test generation

    NARCIS (Netherlands)

    Kwast, Erik

    2001-01-01

    Computer and Telecommunication networks are intended to exchange and transport in- formation in electronic form. Usually, these networks are built by connecting systems of dierent vendors. In order to allow for the exchange of information between such systems, communication protocols are developed a

  9. A new morphologically distinct avian malaria parasite that fails detection by established polymerase chain reaction-based protocols for amplification of the cytochrome B gene.

    Science.gov (United States)

    Zehtindjiev, Pavel; Križanauskienė, Asta; Bensch, Staffan; Palinauskas, Vaidas; Asghar, Muhammad; Dimitrov, Dimitar; Scebba, Sergio; Valkiūnas, Gediminas

    2012-06-01

    -infections, general PCR protocols tend to favor the amplification of the parasite with the higher parasitemia or the amplification with the best matching sequence to the primers. Because the parasitemia of P. polymorphum was >50-fold higher than that of P. relictum and several different primers were tested, we suggest that the failure to amplify P. polymorphum is a more complex problem than why co-infections are commonly overlooked in PCR-based studies. We suggest possible explanations of these results and call for additional research on evolution of mitochondrial genome of hemosporidian parasites.

  10. Application of a radiometric inventory protocol in radiodiagnostics facilities

    International Nuclear Information System (INIS)

    A radiometric study was carried out in two Radiodiagnostic Units, with seven rooms being assessed. Methodology of the Radiodiagnostics Quality Control Protocol ARCAL XLIX (Cooperation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean) of the International Atomic Energy Agency (IAEA) [1] was used.From radiation protection viewpoint, effective dose rates on surface for different relevant positions were calculated.The eighty-five percent (85%) of assessed positions showed effective dose rates within limit values established in the ARCAL XLIX Protocol. Nevertheless, occupationally-exposed personnel (OEP) placed at position A (controlled area)[2] -one meter distant from the phantom- was found to be exceeding by 7 the ARCAL XLIX advised values

  11. Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols

    DEFF Research Database (Denmark)

    Jurik, Mads Johan

    these cryptosystems several multi-party protocols are proposed: A mix-net, which is a tool for making an unknown random permutation of a list of ciphertext. This makes it a useful tool for achieving anonymity. Several voting systems: An efficient large scale election system capable of handling large elections...... an order of group operations to using only , where is the number of signatures checked, and is the security parameter....

  12. Deciding security properties for cryptographic protocols. Application to key cycles

    CERN Document Server

    Comon-Lundh, Hubert; Zalinescu, Eugen

    2007-01-01

    There has been a growing interest in applying formal methods for validating cryptographic protocols and many results have been obtained. In this paper, we re-investigate and extend the NP-complete decision procedure for a bounded number of sessions of Rusinowitch and Turuani. In this setting, constraint systems are now a standard for modeling security protocols. We provide a generic approach to decide general security properties by showing that any constraint system can be transformed in (possibly several) much simpler constraint systems that are called \\emph{solved forms}. As a consequence, we prove that deciding the existence of key cycles is NP-complete for a bounded number of sessions. Indeed, many recent results are concerned with interpreting proofs of security done in symbolic models in the more detailed models of computational cryptography. In the case of symmetric encryption, these results stringently demand that no key cycle (e.g. $\\{k\\}_k$) can be produced during the execution of protocols. We show...

  13. HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS

    Directory of Open Access Journals (Sweden)

    Pandeeswaran Chelliah

    2014-05-01

    Full Text Available In this paper a H-MAC protocol (Hybrid Medium Access Control protocol has been proposed, which is an energy efficient and low latency MAC protocol which uses node ID method to assign priority for certain wireless sensor nodes that are assumed to be present in critical loops for an industrial process control domain. H-MAC overcomes some of the limitations in the existing approaches. In the case of industrial automation scenario, certain sensor loops are found to be time critical, where data’s have to be transferred without any further delay, as failure in immediate transmission leads to catastrophic results for humans as well as machinery in industrial domain. The proposed H-MAC protocol is simulated in NS2 environment, from the result it is observed that the proposed protocol provides better performance compared to the conventional MAC protocols mentioned in the recent literature for the conceded problem. A MAC protocol which provides both energy saving mechanism and that can handle emergency situation is the most desired for any industry. In any industry time and mission critical scenarios requires strict timeliness and reliability along with the energy efficiency. However there are dynamic and harsh environmental conditions for which the MAC protocol must survive and do transmission accordingly. The dynamic changes in topology must also be adapted so that the nodes are in constant link to the destination. Most of the existing MAC protocols have been identified as they face a number of limitations for industrial application domain.

  14. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    Science.gov (United States)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  15. A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks

    CERN Document Server

    Cherian, Mary

    2012-01-01

    The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring context aware physical environments for critical applications.

  16. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    CERN Document Server

    Laurent, Burgy; Lawall, Julia; Muller, Gilles

    2007-01-01

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu, for describing protocol message formats and related processing constraints. From a Zebu specification, a compiler automatically generates stubs to be used by an application to parse network messages. Zebu is easy to use, as it builds on notations used in RFCs to describe protocol grammars. Zebu is also efficient, as the memory usage is tailored to application needs and message fragments can be specified to be processed on demand. Finally, Zebu-based applications are robust, as the Zebu compiler automatically checks specification consistency and generates parsing stubs that include validation of the message structure. Using a mutation analysis in the context of SIP and RTSP, we show that Zebu sign...

  17. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    International Nuclear Information System (INIS)

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA system we achieved the theoretical maximum data throughput limited by UDP both for 1000BASE-T and 1000BASE-KX links. Furthermore, we show that the random jitter of a synchronous clock over a 1000BASE-T link for a PTP application is below 60 ps

  18. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    Science.gov (United States)

    Födisch, P.; Lange, B.; Sandmann, J.; Büchner, A.; Enghardt, W.; Kaever, P.

    2016-01-01

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA system we achieved the theoretical maximum data throughput limited by UDP both for 1000BASE-T and 1000BASE-KX links. Furthermore, we show that the random jitter of a synchronous clock over a 1000BASE-T link for a PTP application is below 60 ps.

  19. Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Qing-hua; QU Yu-gui; LIN Zhi-ting; BAI Rong-gang; ZHAO Bao-hua; PAN Quan-ke

    2007-01-01

    Wireless sensor networks (WSN) using cooperative multiple-input multiple-output (MIMO) communication are effective tools to collect data in several environments. However, how to apply cooperative MIMO in WSN remains a critical challenge, especially in sparse WSN. In this article, a novel clustering scheme is proposed for the application of cooperative MIMO in sparse WSN by extending the traditional low-energy adaptive clustering hierarchy (LEACH) protocol. This clustering scheme solves the problem that the cluster heads (CH) cannot find enough secondary cluster heads (SCH), which are used to cooperate and inform multiple-antenna transmitters with CHs. On the basis of this protocol, the overall energy consumption of the networks model is developed, and the optimal number of CHs is obtained. The simulation results show that this protocol is feasible for the sparse WSN. The simulation results also illustrate that this protocol provides significant energy efficiencies, even after allowing for additional overheads.

  20. Software application for quality control protocol of mammography systems

    International Nuclear Information System (INIS)

    Considering the fact that the Quality Control of the technological process of the mammographic system involves testing of a large number of parameters, it is clearly evident that there is a need for using the information technology for gathering, processing and storing of all the parameters that are result of this process. The main goal of this software application is facilitation and automation of the gathering, processing, storing and presenting process of the data related to the qualification of the physical and technical parameters during the quality control of the technological process of the mammographic system. The software application along with its user interface and database has been made with the Microsoft Access 2003 application which is part of the Microsoft Office 2003 software packet and has been chosen as a platform for developing because it is the most commonly used office application today among the computer users in the country. This is important because it will provide the end users a familiar environment to work in, without the need for additional training and improving the computer skills that they posses. Most importantly, the software application is easy to use, fast in calculating the parameters needed and it is an excellent way to store and display the results. There is a possibility for up scaling this software solution so it can be used by many different users at the same time over the Internet. It is highly recommended that this system is implemented as soon as possible in the quality control process of the mammographic systems due to its many advantages.(Author)

  1. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    CERN Document Server

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko

    2012-01-01

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  2. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    Institute of Scientific and Technical Information of China (English)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic,furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components.

  3. A synchronous Gigabit Ethernet protocol stack for high-throughput UDP/IP applications

    CERN Document Server

    Födisch, P; Sandmann, J; Büchner, A; Enghardt, W; Kaever, P

    2015-01-01

    State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA ...

  4. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    DEFF Research Database (Denmark)

    Burgy, Laurent; Reveillere, Laurent; Lawall, Julia Laetitia;

    2007-01-01

    -specific language, Zebu, for generating robust and efficient message processing layers. A Zebu specification, based on the notation used in RFCs, describes protocol message formats and related processing constraints. Zebu-based applications are efficient, since message fragments can be specified to be processed...

  5. The role of nuclear imaging in the failing heart: myocardial blood flow, sympathetic innervation, and future applications

    OpenAIRE

    Boogers, Mark J.; Fukushima, Kenji; Bengel, Frank M.; Bax, Jeroen J.

    2010-01-01

    Heart failure represents a common disease affecting approximately 5 million patients in the United States. Several conditions play an important role in the development and progression of heart failure, including abnormalities in myocardial blood flow and sympathetic innervation. Nuclear imaging represents the only imaging modality with sufficient sensitivity to assess myocardial blood flow and sympathetic innervation of the failing heart. Although nuclear imaging with single-photon emission c...

  6. Mobile Application Use in Monitoring Patient Adherence to Perioperative Total Knee Arthroplasty Protocols.

    Science.gov (United States)

    Kim, Kelvin; Pham, Diep; Schwarzkopf, Ran

    2016-04-01

    The potential for using mobile applications (apps) as an effective tool to monitor patients in an outpatient setting is promising. Past studies have investigated the use of applications in preoperative and postoperative settings as well as in monitoring and treating chronic illnesses such as diabetes, congestive heart failure (CHF), and multiple sclerosis. However, there is limited data on its specific use in the context of total knee arthroplasty. Given the complicated nature and crucial role of patient adherence to protocols during the preparatory and recovery phases of the procedure, the use of an app can serve as a helpful tool in aiding patients throughout this process. We present a pilot study to assess the efficacy of using such an app in order to monitor patient adherence to total knee arthroplasty-specific preoperative and postoperative protocols. Preoperative protocols used in this study included a 5-item medication protocol and multiple activity instructions. Postoperative patient protocols included following instructions on topics such as recording responses to quality-of-life questions, when and how to contact the clinical team if patients had non-emergent concerns or questions, and carrying out daily physical therapy (PT) exercises. Patients received and recorded responses to these preoperative and postoperative instructions using the iGetBetter program application installed on an iPad Mini, provided to the participants. Patient adherence was based on the data gathered from the patient responses inputted on this app. Adherence rates were comparable to those reported in various past studies that also investigated rates of adherence to health management-related instructions communicated through mobile apps. PMID:27042789

  7. Mobile Application Use in Monitoring Patient Adherence to Perioperative Total Knee Arthroplasty Protocols.

    Science.gov (United States)

    Kim, Kelvin; Pham, Diep; Schwarzkopf, Ran

    2016-04-01

    The potential for using mobile applications (apps) as an effective tool to monitor patients in an outpatient setting is promising. Past studies have investigated the use of applications in preoperative and postoperative settings as well as in monitoring and treating chronic illnesses such as diabetes, congestive heart failure (CHF), and multiple sclerosis. However, there is limited data on its specific use in the context of total knee arthroplasty. Given the complicated nature and crucial role of patient adherence to protocols during the preparatory and recovery phases of the procedure, the use of an app can serve as a helpful tool in aiding patients throughout this process. We present a pilot study to assess the efficacy of using such an app in order to monitor patient adherence to total knee arthroplasty-specific preoperative and postoperative protocols. Preoperative protocols used in this study included a 5-item medication protocol and multiple activity instructions. Postoperative patient protocols included following instructions on topics such as recording responses to quality-of-life questions, when and how to contact the clinical team if patients had non-emergent concerns or questions, and carrying out daily physical therapy (PT) exercises. Patients received and recorded responses to these preoperative and postoperative instructions using the iGetBetter program application installed on an iPad Mini, provided to the participants. Patient adherence was based on the data gathered from the patient responses inputted on this app. Adherence rates were comparable to those reported in various past studies that also investigated rates of adherence to health management-related instructions communicated through mobile apps.

  8. Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices

    Directory of Open Access Journals (Sweden)

    Wolfgang Braun

    2014-05-01

    Full Text Available We explain the notion of software-defined networking (SDN, whose southbound interface may be implemented by the OpenFlow protocol. We describe the operation of OpenFlow and summarize the features of specification versions 1.0–1.4. We give an overview of existing SDN-based applications grouped by topic areas. Finally, we point out architectural design choices for SDN using OpenFlow and discuss their performance implications.

  9. Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices

    OpenAIRE

    Wolfgang Braun; Michael Menth

    2014-01-01

    We explain the notion of software-defined networking (SDN), whose southbound interface may be implemented by the OpenFlow protocol. We describe the operation of OpenFlow and summarize the features of specification versions 1.0–1.4. We give an overview of existing SDN-based applications grouped by topic areas. Finally, we point out architectural design choices for SDN using OpenFlow and discuss their performance implications.

  10. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  11. A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS

    Institute of Scientific and Technical Information of China (English)

    Chen Ping; Ji Yimu; Wang Ruchuan; Huang Haiping; Zhang Dan

    2013-01-01

    Recently,privacy concerns become an increasingly critical issue.Secure multi-party computation plays an important role in privacy-preserving.Secure multi-party computational geometry is a new field of secure multi-party computation.In this paper,we devote to investigating the solutions to some secure geometric problems in a cooperative environment.The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other.A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods.And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs),based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP),so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.

  12. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr;

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...

  13. A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nike Gui

    2010-05-01

    Full Text Available Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source nodes. In this paper, we propose a secure routing and aggregation protocol with low energy cost for sensor networks (named STAPLE, which utilizes one-way hash chain and multi-path mechanism to achieve security of wireless sensor networks, and develop a network expanding model to control communication cost incurred by multi-path routing. Then we discuss the protocol application in multi-sink wireless sensor networks. Finally, we perform the simulation of STAPLE in comparison with INSENS, the results demonstrate that STAPLE achieves a higher level security with considerably low communication overhead.

  14. A High Throughput MAC Protocol for Wireless Sensor Networks in Surveillance Applications

    Directory of Open Access Journals (Sweden)

    Jian-hua WANG

    2013-09-01

    Full Text Available Monitoring a given environment is a kind of major applications in wireless sensor networks. These WSNs should often meet special requirements, such as high throughput support, service differentiation support and energy efficiency. However, related works always emphasis on one or two of them, and hardly consider comprehensively. In this paper, we propose a new-style MAC protocol, which based on the above-mentioned factors. Cluster-based multi-hop scheduling and priority-aware schedule switching are crucial technologies in the MAC protocol. Moreover, idle listening energy consumption is reduced by using a synchronized duty cycle. Experiments show that the proposed strategy achieves our goals. The energy consumption of the radio module is reduced while high throughput is provided.

  15. Therapeutic Ultrasound as a Potential Male Dog Contraceptive: Determination of the Most Effective Application Protocol.

    Science.gov (United States)

    Leoci, R; Aiudi, G; Silvestre, F; Lissner, E A; Marino, F; Lacalandra, G M

    2015-10-01

    Ultrasound is one of the most promising forms of non-invasive contraception and has been studied in several animal models. The objective of the current investigation was to determine the most practical and effective application protocol for dog sterilization. A total of 100 dogs were divided into five equal groups. Group A received 5-min applications three times performed at 48-hr intervals and covering the entire testicular area at frequency of 1 MHz; Group B received 5-min applications three times performed at 48-hr intervals over the dorso-cranial area of the testis at frequency of 3 MHz; Group C received three sequential 5-min applications (at 5-min intervals between applications) covering the entire testicular area at frequency of 1 MHz; Group D received 15-min applications two times performed at 48-hr intervals and covering the entire testicular area at frequency of 1 MHz. The experimental groups' ultrasound had an intensity of 1.5W/cm(2) . The Control Group had the same procedure as Group A, but with the transducer switched-off. Dogs were surgically castrated 40 days following the treatment for histological examination. Azoospermia, testicular volume reduction and apparently irreversible testicular damage were achieved by Group A. No effects were noticed in the other groups. Testosterone levels remained within physiological range with all application protocols. A regimen of three applications of ultrasound at 1 MHz, and 1.5 W/cm(2) , lasting 5 min with an interval of 48 h was effective as permanent sterilization in the dog without hormonal impact.

  16. Application of hysteroscopy in 86 infertility patientients failed in IVF-ET%宫腔镜检查在IVF-ET失败患者中的应用

    Institute of Scientific and Technical Information of China (English)

    王宝金; 李根霞; 张金杏; 杨淑玲

    2010-01-01

    目的 探讨宫腔镜检查在IVF-ET失败患者中应用的重要性.方法 回顾分析2008年1月至2009年1月86例在IVF-ET失败后行宫腔镜检查的病例资料.结果 检查结果发现86例患者中57例有镜下异常,阳性率达66.28%.原发性不孕症宫腔镜检查异常为32例(61.54%),继发性不孕症宫腔镜检查异常为25例(73.53%),病变发生以子宫内膜息肉、子宫内膜炎及宫腔粘连为常见.结论 IVF-ET失败患者中宫腔病变发生率高,是导致IVF-ET失败的重要因素之一,在IVF-ET失败患者中有重要作用.%Objective To explore the application of hysteroscopy in women with inferlitily who failed in IVF-ET. Methods The clinical data of 86 cases of infertility patientients failed in IVF-ET in our Hospitall by using hysteroscopy were analysed between Jan and Dec. Results The incidence of uterine of 86 infertility patients was 66. 8%. The occurrence of uterine anormality in primary infrttility who failed IVF-ET was 61.54%,the secondary infertility patients was 73.53 %. The common disease was endometrial polpy, endometritis and uterine adhesion. Conclusion The rate of pathological changs of uterine cavity is high in infertility who failed in IVF-ET which is one of important infertile factors. Hysteroscopy has perfound useness in infertility clinic.

  17. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  18. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  19. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  20. “Wireless Sensor Networks - Architectures, Protocols, Simulators and Applications: a Survey”

    Directory of Open Access Journals (Sweden)

    S. G. Shiva Prasad Yadav

    2012-09-01

    Full Text Available Wireless Sensor Networks (WSNs have emerged as a new research technology in the distributed computing environment and plays a very important role in the pervasive computing to support various applications. It has a great potential to be utilized in battlefields and in different commercial applications like traffic surveillance, habitat monitoring, construction structures, smart homes, offices and many more. Research on several aspects of WSNs like energy efficiency, power management, rouunrting, topology control, data management and security are progressing extensively. In this technical paper a survey on recent trends in wireless sensor network research, different topologies, routing protocols, simulators and applications is carried out. A smart WSN consists of sensor nodes made of small electronic device and are deployed across a geographical area. These nodes carry out the sensing, processing and transmission of data from different physical environments. They depend on batteries which get drained very soon due to the computation and data transmission to other nodes. The architectures of WSN are mainly depending on application requirements. WSN is a multidisciplinary area of research where different applications developers, users, hardware and software designers need to work closely to implement an efficient application. The different characteristics of the sensor network like flexibility, fault tolerance, high sensing fidelity, low cost and rapid deployment create many new and exciting application areas.

  1. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  2. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  3. Selling Failed Banks

    OpenAIRE

    Joao Granja; Gregor Matvos; Amit Seru

    2014-01-01

    We study the recent episode of bank failures and provide simple facts to better understand who acquires failed banks and which forces drive the losses that the FDIC realizes from these sales. We document three distinct forces related to the allocation of failed banks to potential acquirers. First, a geographically proximate bank is significantly more likely to acquire a failed bank: only 15% of acquirers do not have branches within the state. Sales are more local in regions with more soft inf...

  4. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  5. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  6. APPLICATION OF NEWTON RAPHSON ALGORITHM FOR OPTIMIZING TRANSMISSION CONTROL PROTOCOL PERFORMANCE

    Directory of Open Access Journals (Sweden)

    J. Viji Priya

    2013-01-01

    Full Text Available Wireless networks are growing rapidly. TCP is the most widely-used protocol on Internet and so optimizing TCP performance is very important for fast efficient data transfer. The different existing TCP variants and solutions they have not been analyzed together to identify the bottlenecks in wireless networks. TCP has a major problem in its congestion control algorithm which does not allow the flow to achieve the full available bandwidth on fast long-distance links. This problem has been studied in this study using a new high speed congestion control TCP protocol based on the Newton Raphson algorithm This study further analyses involving six TCP performance evaluation constraints namely, TCP full bandwidth utilization, throughput, packet loss rate, fairness in sharing bandwidth, friendliness in short-RTT and long-RTT and these constraints are used to evaluate the proposed Newton Raphson Congestion Control (NRC-TCP performance. This study shows that the proposed algorithm performs better compared with the other methods of application.

  7. An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

    OpenAIRE

    Ehsan Ahvar; Shohreh Ahvar; Gyu Myoung Lee; Noel Crespi

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, e...

  8. (abstract) Experimental Results From Internetworking Data Applications Over Various Wireless Networks Using a Single Flexible Error Control Protocol

    Science.gov (United States)

    Kanai, T.; Kramer, M.; McAuley, A. J.; Nowack, S.; Pinck, D. S.; Ramirez, G.; Stewart, I.; Tohme, H.; Tong, L.

    1995-01-01

    This paper describes results from several wireless field trials in New Jersey, California, and Colorado, conducted jointly by researchers at Bellcore, JPL, and US West over the course of 1993 and 1994. During these trials, applications communicated over multiple wireless networks including satellite, low power PCS, high power cellular, packet data, and the wireline Public Switched Telecommunications Network (PSTN). Key goals included 1) designing data applications and an API suited to mobile users, 2) investigating internetworking issues, 3) characterizing wireless networks under various field conditions, and 4) comparing the performance of different protocol mechanisms over the diverse networks and applications. We describe experimental results for different protocol mechanisms and parameters, such as acknowledgment schemes and packet sizes. We show the need for powerful error control mechanisms such as selective acknowledgements and combining data from multiple transmissions. We highlight the possibility of a common protocol for all wireless networks, from micro-cellular PCS to satellite networks.

  9. Effects of two different continuous passive motion application protocols on the functional activities of total knee arthroplasty inpatients

    OpenAIRE

    Bakırhan, Serkan; Ünver, Bayram; Karatosun, Vasfi

    2015-01-01

    Objective: The aim of this study was to compare the effects of two different continuous passive motion (CPM) application protocols (low- and high-angle) on the early phase functional activities of total knee arthroplasty inpatients.Methods: The study included 170 patients who underwent primary TKA. While 84 of the TKA patients underwent low-angle CPM application, 86 of the patients underwent high-angle CPM application. The patients’ functional activities were compared using the Iowa Level of ...

  10. Nuclear liability: Joint protocol relating to the application of the Vienna Convention and the Paris Convention, 1988

    International Nuclear Information System (INIS)

    The Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met in Vienna, at the Headquarters of the International Atomic Energy Agency on 21 September 1988. The Joint Protocol establishes a link between the Paris Convention on Third Party Liability in the Field of Nuclear Energy of 1960 and the Vienna Convention on Civil Liability for Nuclear Damage of 1963. The Joint Protocol will extend to the States adhering to it the coverage of the two Conventions. It will also resolve potential conflicts of law, which could result from the simultaneous application of the two Conventions to the same nuclear accident. The Conference on the Relationship between the Paris Convention and the Vienna Convention was jointly organized by the International Atomic Energy Agency and the OECD Nuclear Energy Agency. This publication contains the text of the Final Act of the Conference in the six authentic languages, the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention, also in the six authentic languages and an explanatory note, prepared by the IAEA and NEA Secretariats, providing background information on the content of the Joint Protocol

  11. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  12. CERN and the 10,000th application of the WorldFIP protocol

    CERN Multimedia

    2001-01-01

    On 24 April, CERN received an award for the 10,000th application of the WorldFIP industrial communication network protocol. The award was presented to Juan Antonio Rubio, Head of CERN's ETT Division, by Marc Desjardins, President of the WorldFIP association, which groups together 430 industrial partners with the aim of promoting the WorldFIP concept. Marc Desjardins, President of the WorldFIP association, presenting the award for the 10,000th application to CERN ETT Division Leader Juan Antonio Rubio. From left to right: Guy Baribaud (CERN), Ercole Gallacio (WF), Noël Fayard (WF), Gérard Demars (WF), Dario Fantoni (WF), Marc Desjardins (WF), Raymond Brun (CERN), Jean-Pierre Hauet (WF), Juan Antonio Rubio (CERN), Bernard Jouga (WF), Raymond Rausch (CERN), Jean-Pierre Froidevaux (WF), Marilena Streit-Bianchi (CERN), Michel Rabany (CERN), Patrick Chatelet (WF), Nicolas Cravoisy (WF), Jean Bergeal (WF). Communication networks, also known as fieldbuses, provide for digital comunication betwe...

  13. A review on routing protocols for application in wireless sensor networks

    OpenAIRE

    Neha Rathi; Jyoti Saraswat; ParthaPratim Bhattacharya

    2012-01-01

    Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. So it is essential to design effective and energy aware protocol in order to enhance the network lifetime. In this paper, a review on routing protocol in WSNs is carried out which are classified as data-centric, hierarchical and location based depending on the network structure. Then some of the multipath routing protocols which are widely used in WSNs to improve network performance are also discu...

  14. Evaluation and Application of the Strand-Specific Protocol for Next-Generation Sequencing

    Directory of Open Access Journals (Sweden)

    Kuo-Wang Tsai

    2015-01-01

    Full Text Available Next-generation sequencing (NGS has become a powerful sequencing tool, applied in a wide range of biological studies. However, the traditional sample preparation protocol for NGS is non-strand-specific (NSS, leading to biased estimates of expression for transcripts overlapped at the antisense strand. Strand-specific (SS protocols have recently been developed. In this study, we prepared the same RNA sample by using the SS and NSS protocols, followed by sequencing with Illumina HiSeq platform. Using real-time quantitative PCR as a standard, we first proved that the SS protocol more precisely estimates gene expressions compared with the NSS protocol, particularly for those overlapped at the antisense strand. In addition, we also showed that the sequence reads from the SS protocol are comparable with those from conventional NSS protocols in many aspects. Finally, we also mapped a fraction of sequence reads back to the antisense strand of the known genes, originally without annotated genes located. Using sequence assembly and PCR validation, we succeeded in identifying and characterizing the novel antisense genes. Our results show that the SS protocol performs more accurately than the traditional NSS protocol and can be applied in future studies.

  15. Failed endotracheal intubation

    Directory of Open Access Journals (Sweden)

    Sheykhol Islami V

    1995-07-01

    Full Text Available The incidence of failed intubation is higher in obstetric than other surgical patients. Failed intubation was the 2nd commonest cause of mortality during anesthesia. Bearing in mind that failre to intubate may be unavoidable in certain circumstances, it is worth reviewing. The factors, which may contribute to a disastrous out come. Priorities of subsequent management must include maintaining oxygenation and preventing aspiration of gastric contents. Fiber optic intubation is now the technique of choice with a high success rate and with least trauma to the patient.

  16. Probabilistic risk analysis of aging components which fail on demand. A Bayesian model. Application to maintenance optimization of Diesel engine linings

    International Nuclear Information System (INIS)

    The optimization of preventive maintenance of aging materials can be well modelled through the application of the two-parameters Weibull law. Unfortunately there is no theoretical model describing the aging of components implied in emergency interventions which may fail in very moment of demand. These components are relevant to the safety of Nuclear Power Plants and the main problem with them is the optimization of the maintenance and the test schedule. Indeed the effect of any test is twofold, namely: the test reveals failures which otherwise would occur when the Power Plant would need urgent intervention but at the same time it causes the aging process to step up. The aging process is suspected to affect certain safeguard equipment, but it does not exist a theoretical model of component aging in function of demands. Sections 2.1 and 2.2 of the paper are devoted to the description of a Bayesian model of discrete aging, deriving the likelihood function of the model (data modelling) and to selecting 'the best prior' (Analyst knowledge) that can be associated to the likelihood, respectively. The aspects of numerical integration relative to assessing the predictive reliability of the aging components are discussed in Section 2.3. Section 3 reports a Reliability Centered Maintenance application of the model to cylinders of emergency electrical generators of the NPP nuclear sectors. These components are subjected to an annual endoscopic checking and to a systematical replacement at every 5 years. The statistical Bayesian decision theory was applied to determine an optimal period of cylinder replacement based on the aging model presented in this paper. It is shown that the optimal value is between 10 to 12 years. (author)

  17. Update on the Vienna Protocol and CSC: issues of implementation and application in national legislation

    International Nuclear Information System (INIS)

    This paper aims to reflect the recent developments in respect of the 1997 Vienna Protocol (VP) and the 1997 Convention on Supplementary Compensation (CSC), i.e. the changes in signatories and ratificiations of both instruments, and the impacts these will have upon the geographical scope of nuclear liability laws of those countries covered or linked to each other within the international nuclear liability regime. To the extent that certain countries have ratified either the VP or the CSC, it is important to analyse their existing nuclear liability legislation and the manner in which it already implements or aims to implement certain crucial new elements introduced by both instruments, such as, the liability limitation in time and amount, the extension of the geographical scope to damage wherever suffered as well as in the EEZ, the extension of the definition of nuclear damage and preventive measures, and finally, the deletion of some of the exoneration of the operatos's liability. In this context, especially the concept of nuclear environmental damage and the extent to which it is currently covered by existing nuclear liability legislation or, possibly, environmental law, will be given some special attention. Finally, the paper will focus on various aspects of the implementation and application of these new elements of both 1997 instruments within some CEEC's nuclear liability regimes as an example to identify those issues that will produce special problems (e.g., administrative, legal, insurance, or political) or necessitate additional legislative efforts in respect of their implementation in national laws. (author)

  18. An application protocol for CAD to CAD transfer of electronic information

    Science.gov (United States)

    Azu, Charles C., Jr.

    1993-01-01

    The exchange of Computer Aided Design (CAD) information between dissimilar CAD systems is a problem. This is especially true for transferring electronics CAD information such as multi-chip module (MCM), hybrid microcircuit assembly (HMA), and printed circuit board (PCB) designs. Currently, there exists several neutral data formats for transferring electronics CAD information. These include IGES, EDIF, and DXF formats. All these formats have limitations for use in exchanging electronic data. In an attempt to overcome these limitations, the Navy's MicroCIM program implemented a project to transfer hybrid microcircuit design information between dissimilar CAD systems. The IGES (Initial Graphics Exchange Specification) format is used since it is well established within the CAD industry. The goal of the project is to have a complete transfer of microelectronic CAD information, using IGES, without any data loss. An Application Protocol (AP) is being developed to specify how hybrid microcircuit CAD information will be represented by IGES entity constructs. The AP defines which IGES data items are appropriate for describing HMA geometry, connectivity, and processing as well as HMA material characteristics.

  19. Research and Application of Precision Time Protocol%PTP技术分析与应用

    Institute of Scientific and Technical Information of China (English)

    程翰林

    2011-01-01

    Based on "ALL IP" network background in communication system, the packet network as a unified bearer network will face new problems of synchronization need. The traditional synchronization technology has low accuracy, and it can not meet the demand for high-precision synchronization by new applications. IEEE 1588 Standard (Precision Time Protocol) becomes an effective solution to the problem of high-precision synchronization. Firstly, the principle of PTP is analyzed, then the advantages of PTP are obtained by comparing several commonly synchronization technique. Finally, the application program is proposed, and the implementation and deployment are analyzed flexibility. PTP can be applied in a packet network easily and flexibly with submicrosecond-level synchronization accuracy, and will become an effective alternative to CPS.%在通信系统全网IP化的大背景下,分组网络作为统一承载网将面临新的同步需求问题.传统的同步技术精度较低,无法满足新应用对高精度同步的需求.IEEE 1588标准精密时间同步协议(PIP)的提出,成为一种有效解决高精度同步问题的方案.首先分析了PTP技术的同步原理,接着通过综合比较当今几种常用的同步技术的特点得出PTP技术的优势,最后提出了应用方案,并分析了实施过程和部署灵活性.PTP技术可方便灵活地应用于分组网络中,同步精度可达亚微秒级,将成为GPS的有效替代.

  20. Abortion: Strong's counterexamples fail

    DEFF Research Database (Denmark)

    Di Nucci, Ezio

    2009-01-01

    This paper shows that the counterexamples proposed by Strong in 2008 in the Journal of Medical Ethics to Marquis's argument against abortion fail. Strong's basic idea is that there are cases--for example, terminally ill patients--where killing an adult human being is prima facie seriously morally...... wrong even though that human being is not being deprived of a "valuable future". So Marquis would be wrong in thinking that what is essential about the wrongness of killing an adult human being is that they are being deprived of a valuable future. This paper shows that whichever way the concept...... of "valuable future" is interpreted, the proposed counterexamples fail: if it is interpreted as "future like ours", the proposed counterexamples have no bearing on Marquis's argument. If the concept is interpreted as referring to the patient's preferences, it must be either conceded that the patients in Strong...

  1. A new real-time ethernet MAC protocol for time-critical applications

    Institute of Scientific and Technical Information of China (English)

    沈钢; 许晓鸣; 蔡云泽; 何星; 张卫东

    2002-01-01

    The authors propose a new persistent transmission-based real-time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real-time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real-time traffic and the efficiency of the channel.

  2. Analysis and Application of Covert Channels of Internet Control Message Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Xueguang; ZHANG Huanguo

    2006-01-01

    Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channel's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network.

  3. I Failed Again

    Institute of Scientific and Technical Information of China (English)

    杨友连

    2009-01-01

    Yesterday afternoon I participated in an interview for an English debate contest, and failed, completely1. To make the contest fair, everyone is2 supposed to draw a lot to decide his/her topic. The one I got was "Women should be allowed to sell their eggs." The rest got "Whether military training should be compulsary."3 "Whether compulsary education should be extended to 12 years.", and the like. And I was the third to give my speech. Bad luck!

  4. When physical intuition fails

    OpenAIRE

    Singh, Chandralekha

    2016-01-01

    We analyze the problem solving strategies of physics professors in a case where their physical intuition fails. A non-intuitive introductory-level problem was identified and posed to twenty physics professors. The problem placed the professors in a situation often encountered by students, and their response highlights the importance of intuition and experience in problem solving. While professors had difficulty in solving the problem under the time constraint, they initially employed a system...

  5. Who fails lantern tests?

    Science.gov (United States)

    Cole, B L; Vingrys, A J

    1983-05-01

    A battery of clinical colour vision tests was given to a group of 100 observers with abnormal colour vision who were also tested on the Farnsworth lantern and the Holmes-Wright lanterns types A and B. It was found that clinical colour vision tests are imperfect predictors of lantern test performance. However, observers classified as having a 'severe' colour vision defect were found to fail the lantern tests but only one half to two-thirds of those who fail the lantern tests can be identified in this way. It is not possible to identify with certainty any of the people likely to pass the lantern tests: about one-third to two-thirds of observers classified as being mildly affected fail the lantern tests. The Farnsworth D-15 and City University tests were found to be the best predictors of lantern test performance but other tests such as the Nagel anomaloscope, the H-16, L'Anthony's desaturated test can also be used. The lack of a strong correlation between clinical tests and the recognition of the small coloured stimuli presented by the lantern tests suggests that clinical tests do not test the same aspect of colour vision that is important to the recognition of signal lights. For this reason lantern tests should be retained for occupational testing of colour vision.

  6. Space-Data Routers: Advanced data routing protocols for enhancing data exploitation for space weather applications

    Science.gov (United States)

    Anastasiadis, Anastasios; Daglis, Ioannis A.; Balasis, George; Papadimitriou, Constantinos; Tsaoussidis, Vassilios; Diamantopoulos, Sotirios

    2014-05-01

    Data sharing and access are major issues in space sciences, as they influence the degree of data exploitation. The availability of multi-spacecraft distributed observation methods and adaptive mission architectures require computationally intensive analysis methods. Moreover, accurate space weather forecasting and future space exploration far from Earth will be in need of real-time data distribution and assimilation technologies. The FP7-Space collaborative research project "Space-Data Routers" (SDR) relies on space internetworking and in particular on Delay Tolerant Networking (DTN), which marks the new era in space communications. SDR unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The main goal is to allow space agencies, academic institutes and research centers to share space-data generated by single or multiple missions, in an efficient, secure and automated manner. Here we are presenting the architecture and basic functionality of a DTN-based application specifically designed in the framework of the SDR project, for data query, retrieval and administration that will enable addressing outstanding science questions related to space weather, through the provision of simultaneous real-time data sampling at multiple points in space. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  7. A Multi-Criteria Model Selection Protocol for Practical Applications to Nutrient Transport at the Catchment Scale

    Directory of Open Access Journals (Sweden)

    Ye Tuo

    2015-06-01

    Full Text Available Process-based models are widely used to investigate nutrient dynamics for water management purposes. Simulating nutrient transport and transformation processes from agricultural land into water bodies at the catchment scale are particularly relevant and challenging tasks for water authorities. However, few practical methods guide inexperienced modelers in the selection process of an appropriate model. In particular, data availability is a key aspect in a model selection protocol, since a large number of models contain the functionalities to predict nutrient fate and transport, yet a smaller number is applicable to specific datasets. In our work, we aim at providing a model selection protocol fit for practical application with particular emphasis on data availability, cost-benefit analysis and user’s objectives. We select for illustrative purposes five process-based models with different complexity as “candidates” models: SWAT (Soil and Water Assessment Tool, SWIM (Soil and Water Integrated Model, GWLF (Generalized Watershed Loading Function, AnnAGNPS (Annualized Agricultural Non-Point Source Pollution model and HSPF (Hydrological simulation program-FORTRAN. The models are described in terms of hydrological and chemical output and input requirements. The model selection protocol considers data availability, model characteristics and user’s objectives and it is applied to hypothetical scenarios. This selection method is particularly formulated to choose process-based models for nutrient modeling, but it can be generalized for other applications which are characterized by a similar degree of complexity.

  8. On the security of a simple three-party key exchange protocol without server's public keys.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  9. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    DEFF Research Database (Denmark)

    Mikkelsen, Gert Læssøe; Keller, Marcel; Rupp, Andy

    2012-01-01

    In this paper, we investigate on threshold proofs, a framework for distributing the prover’s side of interactive proofs of knowledge over multiple parties. Interactive proofs of knowledge (PoK) are widely used primitives of cryptographic protocols, including important user-centric protocols......, such as identification schemes, electronic cash (e-cash), and anonymous credentials. We present a security model for threshold proofs of knowledge and develop threshold versions of well-known primitives such as range proofs, zero-knowledge proofs for preimages of homomorphisms (which generalizes PoKs of discrete...... logarithms, representations, p-th roots, etc.), as well as OR statements. These building blocks are proven secure in our model. Furthermore, we apply the developed primitives and techniques in the context of user-centric protocols. In particular, we construct distributed-user variants of Brands’ e...

  10. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  11. When physical intuition fails

    CERN Document Server

    Singh, Chandralekha

    2016-01-01

    We analyze the problem solving strategies of physics professors in a case where their physical intuition fails. A non-intuitive introductory-level problem was identified and posed to twenty physics professors. The problem placed the professors in a situation often encountered by students, and their response highlights the importance of intuition and experience in problem solving. While professors had difficulty in solving the problem under the time constraint, they initially employed a systematic approach, e.g., visualizing the problem, considering various conservation laws, and examining limiting cases. After finding that familiar techniques were not fruitful, they made incorrect predictions based on one of two equally important factors. By contrast, other more familiar problems that require the consideration of two important principles (e.g., conservation of both energy and momentum for a ballistic pendulum) are quickly solved by the same professors. The responses of students who were given the same problem...

  12. On the Performance of the Current MANET Routing Protocols for VoIP, HTTP, and FTP Applications

    Directory of Open Access Journals (Sweden)

    Waheb A. Jabbar

    2014-01-01

    Full Text Available The recent advances of ensemble mobile environment of smart devices with embedded sensors have enabled the MANET to play a key role in the smart cities as well as WSN and WMN. However, these smart devices are still limited in terms of energy, processor, and memory. Moreover, the efficient routing for reliable network connectivity at anytime, anywhere, and about everything is still a challenge in multihop wireless networks. This paper evaluates the QoS and energy efficiency of three active routing protocols: (i OLSRv2, a successor to OLSR, (ii DYMO, a successor to both DSR and AODV, and (iii MP-OLSR multipath extension to OLSRv2. In contrast to the related previous works which focused only on CBR traffic without considering the influence of specific traffic types on the performance of routing protocols, this work focused on this area from a different perspective. It evaluates the performance of three internet-based traffic types that can be used in the smart city applications: VoIP, HTTP, and FTP using different simulation models. The impact of the network density, load traffic, and nodes mobility on the considered protocols was evaluated by considering particular performance metrics for each traffic application. Based on the results, the study concludes by presenting useful recommendations for future work.

  13. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  14. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  15. Fast Oblivious AES A Dedicated application of the MiniMac protocol

    DEFF Research Database (Denmark)

    Zakarias, Rasmus Winther; Damgård, Ivan Bjerre

    2015-01-01

    ]. They presented an optimized implementation of the so-called MiniMac protocol [DZ13] that runs in the pre-processing model, and applied this to a binary AES circuit. In this paper we de- scribe how to dedicate the pre-processing to the structure of AES, which improves significantly the throughput and latency...

  16. Industrial output restriction and the Kyoto protocol. An input-output approach with application to Canada

    International Nuclear Information System (INIS)

    The objective of this paper is to assess the economic impacts of reducing greenhouse gas emissions by decreasing industrial output in Canada to a level that will meet the target set out in the Kyoto Protocol. The study uses an ecological-economic Input-Output model combining economic components valued in monetary terms with ecologic components - GHG emissions - expressed in physical terms. Economic and greenhouse gas emissions data for Canada are computed in the same sectoral disaggregation. Three policy scenarios are considered: the first one uses the direct emission coefficients to allocate the reduction in industrial output, while the other two use the direct plus indirect emission coefficients. In the first two scenarios, the reduction in industrial sector output is allocated uniformly across sectors while it is allocated to the 12 largest emitting industries in the last one. The estimated impacts indicate that the results vary with the different allocation methods. The third policy scenario, allocation to the 12 largest emitting sectors, is the most cost effective of the three as the impacts of the Kyoto Protocol reduces Gross Domestic Product by 3.1% compared to 24% and 8.1% in the first two scenarios. Computed economic costs should be considered as upper-bounds because the model assumes immediate adjustment to the Kyoto Protocol and because flexibility mechanisms are not incorporated. The resulting upper-bound impact of the third scenario may seem to contradict those who claim that the Kyoto Protocol would place an unbearable burden on the Canadian economy. (author)

  17. Lower bounds on information complexity via zero-communication protocols and applications

    CERN Document Server

    Kerenidis, Iordanis; Lerays, Virginie; Roland, Jeremie; Xiao, David

    2012-01-01

    We show that almost all known lower bound methods for communication complexity are also lower bounds for the information complexity. In particular, we define a relaxed version of the partition bound of Jain and Klauck and prove that it lower bounds the information complexity of any function. Our relaxed partition bound subsumes all norm based methods (e.g. the factorization norm method) and rectangle-based methods (e.g. the rectangle/corruption bound, the smooth rectangle bound, and the discrepancy bound), except the partition bound. Our result uses a new connection between rectangles and zero-communication protocols where the players can either output a value or abort. We prove the following compression lemma: given a protocol for a function f with information complexity I, one can construct a zero-communication protocol that has non-abort probability at least 2^{-O(I)} and that computes f correctly with high probability conditioned on not aborting. Then, we show how such a zero-communication protocol relate...

  18. The application of MODBUS protocol in XFR instrument used to analyze the cement composition

    International Nuclear Information System (INIS)

    This paper briefly introduced the MODBUS protocol at the beginning. Then the data communication between XFR instrument and the main controlling system of cement production is discussed. The diagram of data communication and part of member functions of serial port class are provided, under Visual C++ programming language

  19. DEVELOPMENT AND APPLICATION OF PROTOCOLS FOR EVALUATION OF OIL SPILL BIOREMEDIATION (RESEARCH BRIEF)

    Science.gov (United States)

    Protocols were developed and evaluated to assess the efficacy and environmental safety of commercial oil spill bioremediation agents (CBAs). Test systems that simulate oil slicks on open water or oiled sandy beaches were used to test the effectiveness of CBAs. Gravimetric and gas...

  20. Why foreign aid fails

    Directory of Open Access Journals (Sweden)

    Prokopijević Miroslav

    2007-01-01

    Full Text Available The main point of this paper is that foreign aid fails because the structure of its incentives resembles that of central planning. Aid is not only ineffective, it is arguably counterproductive. Contrary to business firms that are paid by those they are supposed to serve (customers, aid agencies are paid by tax payers of developed countries and not by those they serve. This inverse structure of incentives breaks the stream of pressure that exists on the commercial market. It also creates larger loopholes in the principle-agent relationship on each point along the chain of aid delivery. Both factors enhance corruption, moral hazard and negative selection. Instead of promoting development, aid extends the life of bad institutions and those in power. Proposals to reform foreign aid – like aid privatization and aid conditionality – do not change the existing structure of the incentives in aid delivery, and their implementation may just slightly improve aid efficacy. Larger improvement is not possible. For that reason, foreign aid will continue to be a waste of resources, probably serving some objectives different to those that are usually mentioned, like recipient’s development poverty reduction and pain relief.

  1. Cryopreservation of cryosensitive basidiomycete cultures by application and modification of perlite protocol.

    Science.gov (United States)

    Sato, Masanori; Sukenobe, Junji; Nakagiri, Akira

    2012-01-01

    Homolka's perlite protocol (HPP) for cryopreservation of fungal cultures was evaluated in 12 strains (7 species) of cryosensitive basidiomycete cultures maintained in NBRC culture collection by investigating viability, time to recover, and basic morphological study after freezing and storing at -80 degree C for 6 months. The viability of the fungal strains was 60 percent in Phallus hadriani and 100 percent in remaining 11 strains, indicating the efficacy of HPP method for cryopreservation of some cryosensitive basidiomycetes. The HPP method was modified by changing the addition of cryoprotectant (glycerol) from prior precultivation to post precultivation, limiting the cryoprotectant exposure time to 48 hours, and increasing the glycerol concentration from 5 percent to 12 percent. The viability of P. hadriani strain increased from 60 percent to 100 percent with the modified perlite protocol after storage at -80 degree C for 6 months.

  2. A Sample-to-Sequence Protocol for Genus Targeted Transcriptomic Profiling: Application to Marine Synechococcus

    Science.gov (United States)

    Pitt, Frances D.; Millard, Andrew; Ostrowski, Martin; Dervish, Suat; Mazard, Sophie; Paulsen, Ian T.; Zubkov, Mikhail V.; Scanlan, David J.

    2016-01-01

    Recent studies using whole community metagenomic and metatranscriptomic approaches are revealing important new insights into the functional potential and activity of natural marine microbial communities. Here, we complement these approaches by describing a complete ocean sample-to-sequence protocol, specifically designed to target a single bacterial genus for purposes of both DNA and RNA profiling using fluorescence activated cell sorting (FACS). The importance of defining and understanding the effects of a sampling protocol are critical if we are to gain meaningful data from environmental surveys. Rigorous pipeline trials with a cultured isolate, Synechococcus sp. BL107 demonstrate that water filtration has a well-defined but limited impact on the transcriptomic profile of this organism, whilst sample storage and multiple rounds of cell sorting have almost no effect on the resulting RNA sequence profile. Attractively, the means to replicate the sampling strategy is within the budget and expertise of most researchers.

  3. A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    A.Damodaram

    2012-10-01

    Full Text Available With the economy developing and popular Internet, the general concept of contract signing has changed.In the past, people usually sign a contract at the same time and same place face to face, but actually eachparty involved in contract may live in different part of earth, they want to sign something for business orsome other things in economic, efficient, secure and fairway. A fair contract signing protocol allows twopotentially mis-trusted parities to exchange their commitments (i.e., digital signatures to an agreedcontract over the Internet in a fair way, so that either each of them obtains the other’s signature, orneither party does. Based on the LUCAS signature scheme, a new digital anonymous contract signingprotocol is proposed in this paper. Like the existing LUCAS-based solutions for the same problem, ourprotocol is fair, anonymous and optimistic. Furthermore, the proposed protocol satisfied a newproperty, i.e., it is abuse-free. That is, if the protocol is executed unsuccessfully, either of the two partiescan not show the validity of intermediate results to others.

  4. The 1988 Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention. Explanatory Text

    International Nuclear Information System (INIS)

    At the International Conference on the Safety of Transport of Radioactive Material, held in Vienna in July 2003, it was noted that there are a number of liability conventions to which many States are Parties but to which many others are not, and that the provisions of the liability conventions and the relationships between them are not simple to understand. It was suggested, therefore, that an explanatory text for these instruments be prepared to assist in developing a common understanding of the complex legal issues involved and thereby to promote adherence to these instruments. In view of this suggestion, and in order to foster an effective, global nuclear liability regime, the International Expert Group on Nuclear Liability (INLEX) was established in September 2003. Since its establishment, INLEX has held several meetings, as a result of which it, inter alia, finalized explanatory texts on the nuclear liability instruments adopted under IAEA auspices in 1997, namely, the Protocol to Amend the Vienna Convention on Civil Liability for Nuclear Damage and the Convention on Supplementary Compensation for Nuclear Damage. These explanatory texts have since been published as IAEA International Law Series No. 3. Thereafter, INLEX also developed and finalized the present explanatory text on the 1988 Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention. This publication complements IAEA International Law Series No. 3 and comprises the explanatory text on the Joint Protocol and the text of the Joint Protocol as adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met at IAEA Headquarters in Vienna in September 1988 under the joint auspices of the IAEA and the OECD Nuclear Energy Agency. It is hoped that this publication will further increase the awareness of nuclear liability as an important aspect of nuclear law.

  5. Cryptanalysis on Cheng et al. protocol

    Science.gov (United States)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  6. Developing experimental protocols for chronic irradiation studies: the application of a good practice guide framework

    International Nuclear Information System (INIS)

    The EC-funded FASSET (Framework for Assessment of Environmental Impact) project collated information on the transfer, dosimetry, and effects of ionising radiation on wildlife. A major output from the project is the FASSET Radiation Effects Database (FRED). A review of the information contained within FRED highlighted that information on the effects of low-dose, chronic exposure was, at best, fragmentary. However, these data are required to define the dose effect relationships needed to underpin the assessment tools that are being developed. To address this requirement, a series of four Good Practice Guides (GPGs) has been produced as part of a protocol development framework. This framework aims to harmonise experimental approaches, with a view to ensuring that all necessary data on appropriate endpoints are collected, so that dose effect relationships can be determined. The GPGs cover test species selection, endpoint selection, radiation exposure and experimental design considerations. A key is used to guide researchers through the GPGs and the decisions made are recorded on an output pro-forma. The completed pro-forma forms the basis of the experimental protocol. The pro-forma also indicates the information that should be included when presenting the results of the experiment. Standardising approaches ensures that results are comparable between experiments and that they are suitable for determining dose effect relationships. This protocol development framework has been adopted by the UK Environment Agency as a document upon which future Agency-funded experimental work on the effects of chronic, low-level exposure to ionising radiation will be based. It is hoped that the framework will gain acceptance in the wider scientific community and facilitate addressing the knowledge gaps that have been identified in order that successful protection of non-human biota can be demonstrated. (author)

  7. A conceptual framework and protocol for defining clinical decision support objectives applicable to medical specialties

    Directory of Open Access Journals (Sweden)

    Timbie Justin W

    2012-09-01

    Full Text Available Abstract Background The U.S. Centers for Medicare and Medicaid Services established the Electronic Health Record (EHR Incentive Program in 2009 to stimulate the adoption of EHRs. One component of the program requires eligible providers to implement clinical decision support (CDS interventions that can improve performance on one or more quality measures pre-selected for each specialty. Because the unique decision-making challenges and existing HIT capabilities vary widely across specialties, the development of meaningful objectives for CDS within such programs must be supported by deliberative analysis. Design We developed a conceptual framework and protocol that combines evidence review with expert opinion to elicit clinically meaningful objectives for CDS directly from specialists. The framework links objectives for CDS to specialty-specific performance gaps while ensuring that a workable set of CDS opportunities are available to providers to address each performance gap. Performance gaps may include those with well-established quality measures but also priorities identified by specialists based on their clinical experience. Moreover, objectives are not constrained to performance gaps with existing CDS technologies, but rather may include those for which CDS tools might reasonably be expected to be developed in the near term, for example, by the beginning of Stage 3 of the EHR Incentive program. The protocol uses a modified Delphi expert panel process to elicit and prioritize CDS meaningful use objectives. Experts first rate the importance of performance gaps, beginning with a candidate list generated through an environmental scan and supplemented through nominations by panelists. For the highest priority performance gaps, panelists then rate the extent to which existing or future CDS interventions, characterized jointly as “CDS opportunities,” might impact each performance gap and the extent to which each CDS opportunity is compatible with

  8. A Survey on Application Layer Protocols for the Internet of Things

    OpenAIRE

    Karagiannis, Vasileios; Chatzimisios, Periklis; Vázquez-Gallego, Francisco; Alonso-Zárate, Jesús

    2015-01-01

    It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The framework that current IoT platforms use consists mostly in technol...

  9. Analysis and Applications of Session Initiation Protocol(SIP)in Internet Telephony

    Institute of Scientific and Technical Information of China (English)

    LUO Lin; WARFIELD Bob

    2005-01-01

    Session Initiation Protocol(SIP)is a key technology in the Internet telephony or Voice-over-IP(VoIP), also it is an important signaling technology in the next generation multimedia communications.Based on the comparison between SIP and H.323 technology,this paper concludes the advantages of SIP.Then grounded on the major components and their interaction,it analyzes the mechanism and features of the Internet telephony based on SIP.Finally,it discusses the disadvantages of SIP and provides the emphasis of future work.

  10. HTML5 WebSocket protocol and its application to distributed computing

    OpenAIRE

    Muller, Gabriel L.

    2014-01-01

    HTML5 WebSocket protocol brings real time communication in web browsers to a new level. Daily, new products are designed to stay permanently connected to the web. WebSocket is the technology enabling this revolution. WebSockets are supported by all current browsers, but it is still a new technology in constant evolution. WebSockets are slowly replacing older client-server communication technologies. As opposed to comet-like technologies WebSockets' remarkable performances is a result of the p...

  11. Exploitation of existing Voice over Internet Protocol Technology for the Navy application

    OpenAIRE

    Vegter, Henry M.; Wallace, David T.

    2002-01-01

    This thesis documents an investigation into the technology of Voice over Internet Protocol (VoIP). VoIP promises to be a widely accepted technology in the future. The issues of efficient use of bandwidth over network choke points, cost savings gained from a common data and voice infrastructure, reduced cost associated with toll calls and the merger of the telephone with the desktop will keep adoption of this technology on the path to ubiquitous use. Topics explored in the thesis include conve...

  12. The application of Kyoto Protocol in Italy: role and required synergies between central and regional administrations

    Directory of Open Access Journals (Sweden)

    Pilli R

    2007-01-01

    Full Text Available According to art. 3.3 of the Kyoto Protocol, Parties included in Annex I shall report the net changes in greenhouse gas emissions by sources and removals by sinks resulting from afforestation, reforestation and deforestation activities. To assess these activities, Italy has to define methods to estimate land use change occurring after 31 December 1989. On the other hand, Italy elected forest management as additional human-induced activity to attain the goals of reduction of greenhouse gas emissions. The paper considers the key-role that central and regional Administrations may have in order to solve some specific problems regarding data collection and management issues.

  13. Individualized music for dementia: Evolution and application of evidence-based protocol

    Science.gov (United States)

    Gerdner, Linda A

    2012-01-01

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. PMID:24175165

  14. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-10-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  15. Applicability of analytical protocols for the characterisation of carbon-supported platinum group metal fuel cell electrocatalysts

    Directory of Open Access Journals (Sweden)

    V. Linkov

    2010-01-01

    Full Text Available The nanoparticulate size of fuel cell electrocatalysts raises significant challenges in the analytical techniques used in their structural and electrochemical characterisation. For this reason, the applicability of analytical protocols in the qualitative and quantitative characterisation of nanophase fuel cell electrocatalysts was investigated. A set of structural and chemical properties influencing the performance of the electrocatalysts was identified. A large range of analytical tools was employed in characterising the electrocatalysts of interest. High accuracy and precision in the quantitative and qualitative structural and electrochemical characterisation of Pt/C and Pt-Ru/C nanophase electrocatalysts was demonstrated. Certain techniques were deemed to be highly applicable in discriminating between high- and low-performance electrocatalysts based on their structural and electrochemical properties. The goal of this effort is to contribute to the development of South Africa’s capabilities in the emerging hydrogen economy.

  16. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  17. To fail or not to fail : clinical trials in depression

    NARCIS (Netherlands)

    Santen, Gijs Willem Eduard

    2008-01-01

    To fail or not to fail – Clinical trials in depression investigates the causes of the high failure rate of clinical trials in depression research. Apart from the difficulties in the search for new antidepressants during drug discovery, faulty clinical trial designs hinder their evaluation during dru

  18. ALERT协议在水情测报系统中的应用分析%Application And Development of ALERT Protocol in Hydrological Forecasting System

    Institute of Scientific and Technical Information of China (English)

    薛升宁; 胡鸣东; 祁永涛; 朱思良

    2011-01-01

    The characteristics and related industry application of ALERT protocol are introduced. The limitations of ALERT protocol and the update state of ALERT-2 protocol are discussed, the improved ALERT-2 is proposed, and the application prospect of the protocol is put forward.%简单介绍了ALERT协议的特点及其相关行业应用情况,详细分析了ALERT协议的局限性以及改进型ALERT-2协议的最新发展情况,给出了ALERT-2针对ALERT协议的局限性所做出的一些改进,并分析了ALERT协议在水情自动浈6报系统中的应用前景。

  19. Application of the IAP cardiovascular fitness test protocol for Austromars candidate screening

    Science.gov (United States)

    Grasser, E. K.; Goswami, N.; Jantscher, A.; Roessler, A.; Vrecko, K.; Groemer, G.; Hinghofer-Szalkay, H.

    2007-10-01

    Rationale: The purpose of our research was to test for cardiovascular stability within 16 Austromars candidates, and to determine hemodynamic variables and hormones in a presyncopal state as evoked by a specific test protocol. Procedures and methods: We used a graded orthostatic stress (GOS) paradigm consisting of head-up tilt (HUT) combined with lower body negative pressure (LBNP) up to a presyncopal end-point on 15 males and one healthy female. Hemodynamic parameters were monitored and venous blood samples taken. Results: From supine control to presyncope, mean standing time was 12.3 ± 1.2 min, heart rate (HR) increased by 68 ± 12% (p responses under severe stress conditions.

  20. Development of a quality assurance protocol for peripheral subtraction imaging applications

    International Nuclear Information System (INIS)

    Peripheral subtraction scanning is used to trace the blood vessels of upper and lower extremities. In some modern C-arm fluoroscopy systems this function is performed automatically. In this mode the system is programmed to advance and stop in a series of steps taking a mask image at each point. The system then repeats each step after the contrast agent has been injected, and produces a DSA image at each point. Current radiographic quality assurance protocols do not address this feature. This note reviews methods of measuring system vibration while images are being acquired in automated peripheral stepping. The effect on image quality pre- and post-image processing is assessed. Results show that peripheral stepping DSA does not provide the same degree of image quality as static DSA. In examining static test objects, the major cause of the reduction in image quality is misregistration due to vibration of the image intensifier during imaging. (author)

  1. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  2. Modeling Acidification Recovery on Threatened Ecosystems: Application to the Evaluation of the Gothenburg Protocol in France

    Energy Technology Data Exchange (ETDEWEB)

    Moncoulon, David [CNRS-IRD-Universite Paul Sabatier, Laboratoire des Mecanismes de Transfert en Geologie, UMR 5563 (France); Probst, Anne [CNRS-INPT-Universite Paul Sabatier, ECOLAB UMR 5245 (France)], E-mail: anne.probst@ensat.fr; Martinson, Liisa [Lund University Centre for Sustainability Studies (Sweden)

    2007-03-15

    To evaluate the acid deposition reduction negotiated for 2010 within the UNECE LRTAP Gothenburg Protocol, sulphur and nitrogen deposition time-series (1880-2100) were compared to critical loads of acidity on five French ecosystems: Massif Central basalt (site 1) and granite (2); Paris Bassin tertiary sands (3); Vosges mountains sandstone (4) and Landes eolian sands (5). The SAFE model was used to estimate the response of soil solution pH and [Al]/[BC] ratio to the deposition scenario. Among the five sites, critical loads were exceeded in the past at sites 3, 4 and 5. Sites 3 and 4 were still expected to exceed in 2010, the Protocol year. Further reduction of atmospheric deposition, mainly nitrogen, would be needed to achieve recovery on these ecosystems. At sites 3, 4 and 5, the delay between the critical load exceedance and the violation of the critical chemical criterion was estimated to be 10 to 30 years in the top soil and 50 to 90 years in the deeper soil. At site 5, a recovery was expected in the top soil in 2010 with a time lag of 10 years. Unexpectedly, soil pH continued to decrease after 1980 in the deeper soil at sites 2 and 5. This time lag indicated that acidification moved down the soil profile as a consequence of slow base cation depletion by ion exchange. This delayed response of the soil solution was the result of the combination of weathering rates and vegetation uptake but also of the relative ratio between base cation deposition and acid compounds.

  3. Informatics in radiology: CT contrast protocols application for the iPad: new resource for technologists, nurses, and radiologists.

    Science.gov (United States)

    Raman, Siva P; Raminpour, Sara; Horton, Karen M; Fishman, Elliot K

    2013-05-01

    The iPad, iPhone, and other portable devices offer a unique opportunity for radiology education, allowing presentation of information in a simple, concise, and mobile fashion to large groups of learners. The CT Contrast Protocols application for the iPad and iPhone is one of the first radiology applications in the Apple App Store to focus on radiology education and was designed to address the lack of practical information on contrast media for radiologists, technologists, nurses, and trainees. The application was developed in response to questions about contrast media use from clinicians, technologists, and nurses; its content is based on questions from these members of the authors' department and hospital, as well as users of the CTisus.com Web site. The application uses a simple interface that requires no training and can be easily navigated by those who have only recently begun using an iPad or iPhone. It provides simple, easily understood answers to many common questions about contrast media use, all arranged under several subject headings. The application is constantly evolving and represents an aggregate of the knowledge found in the literature, the American College of Radiology's consensus guidelines, and the institutional practices of the computed tomography division of Johns Hopkins Hospital. Supplemental material available at http://radiographics.rsna.org/lookup/suppl/doi:10.1148/rg.333125106/-/DC1. PMID:23479681

  4. Vérification des protocoles cryptographiques : Comparaison des modèles symboliques avec une application des résultats --- Etude des protocoles récursifs

    OpenAIRE

    Hördegen, Heinrich

    2007-01-01

    Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation symbolique de protocoles avec pour objectif la preuve de propriétés de sécurité. La thèse comprend deux parties: La première partie définit quatre modèles symboliques différant par les moyens syntaxiques que les concepteur peuvent utiliser pour représenter les primitives cryptographiques. On a observé que les vérificateurs utilisent des astuces de codage dans des modèles peu riches pour représ...

  5. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  6. Sealed source and device design safety testing. Technical report on the findings of task 4. Investigation of a failed brachtherapy needle applicator

    International Nuclear Information System (INIS)

    As a result of an incident in which a radioactive brachytherapy treatment source was temporarily unable to be retracted, an analysis was performed on the needle applicator used during the treatment. In this report, the results of laboratory evaluations of the physical, mechanical, and metallurgical condition of the subject applicator and two additional applicators are presented. A kink formed in the subject applicator during the incident. The laboratory investigation focused on identifying characteristics which would increase the susceptibility of an applicator to form a kink when subjected to bending loads. The results obtained during this investigation could not conclusively identify the cause of the kink. The subject applicator exhibited no unique features which would have made it particularly susceptible to forming a kink. The three applicators examined represent two methods of manufacturing. A number of characteristics inherent to the method used to manufacture the subject applicator which could lead to an increased susceptibility to the formation of a kink were observed. The use of an insertion device, such as the biopsy needle used during this incident, could also dramatically increase the likelihood of the formation of a kink if the applicator is subjected to bending loads. 33 figs., 4 tabs

  7. Sealed source and device design safety testing. Technical report on the findings of task 4. Investigation of a failed brachtherapy needle applicator

    Energy Technology Data Exchange (ETDEWEB)

    Lukezich, S.J.

    1997-05-01

    As a result of an incident in which a radioactive brachytherapy treatment source was temporarily unable to be retracted, an analysis was performed on the needle applicator used during the treatment. In this report, the results of laboratory evaluations of the physical, mechanical, and metallurgical condition of the subject applicator and two additional applicators are presented. A kink formed in the subject applicator during the incident. The laboratory investigation focused on identifying characteristics which would increase the susceptibility of an applicator to form a kink when subjected to bending loads. The results obtained during this investigation could not conclusively identify the cause of the kink. The subject applicator exhibited no unique features which would have made it particularly susceptible to forming a kink. The three applicators examined represent two methods of manufacturing. A number of characteristics inherent to the method used to manufacture the subject applicator which could lead to an increased susceptibility to the formation of a kink were observed. The use of an insertion device, such as the biopsy needle used during this incident, could also dramatically increase the likelihood of the formation of a kink if the applicator is subjected to bending loads. 33 figs., 4 tabs.

  8. Evaluation of two protocols for low-level laser application in patients submitted to orthodontic treatment

    Directory of Open Access Journals (Sweden)

    Mariana Marquezan

    2013-02-01

    Full Text Available INTRODUCTION: Different low-level laser (LLL irradiation protocols have been tested to accelerate orthodontic tooth movement (OTM. Nevertheless, divergent results have been obtained. It was suggested that the stimulatory action of low level laser irradiation occurs during the proliferation and differentiation stages of bone cellular precursors, but not during later stages. OBJECTIVE: The purpose of this study was to determine the effect of two protocols of LLL irradiation on experimental tooth movement: One with daily irradiations and another with irradiations during the early stages. METHODS: Thirty-six rats were divided into control groups (CG1, CG2, CG3 and irradiated groups (IrG1, IrG2, IrG3 according to the presence of: experimental tooth movement, laser irradiation, type of laser irradiation protocol and date of euthanasia (3th or 8th day of experiment. At the end of experimental periods, a quantitative evaluation of the amount of OTM was made and the reactions of the periodontium were analyzed by describing cellular and tissue reactions and by counting blood vessels. RESULTS: The amount of OTM revealed no significant differences between groups in the same experimental period (p INTRODUÇÃO: diferentes protocolos de irradiação por laser de baixa potência (LBP têm sido testados para potencializar o movimento ortodôntico; entretanto, há resultados divergentes. Foi sugerido que seu efeito bioestimulador ocorre nas fases de proliferação e diferenciação celular, não agindo em estágios tardios. OBJETIVO: avaliar o efeito de dois protocolos de irradiação do LBP na movimentação ortodôntica: um com irradiações diárias e outro em que irradiações foram realizadas apenas nos períodos iniciais. MÉTODOS: trinta e seis ratos Wistar foram divididos em grupos controles (GC1, GC2 e GC3 e irradiados (GIr1, GIr2 e GIr3, de acordo com a presença de dispositivo ortodôntico, a presença de irradiação, o tipo de protocolo de irradia

  9. ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    G.Padmavathi

    2012-02-01

    Full Text Available A mobile ad hoc network (MANETs is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports, dynamic network topologies, open communication channels, and limited device capabilities and bandwidths, have made secure, reliable and efficient routing operations in MANET a challenging task. The ultimate goal of the security solutions for MANET is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability to mobile users. To achieve the goals, the security solution need for entire protocol stack. . The proposed protocol ANODRECC with Telnet provide application layer security and it ensures route anonymity and location privacy and is robust against eavesdropping attack.For route anonymity, it prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, it ensures that adversaries cannot discover the real identities of local transmitters. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has exposed improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio and Average jitter.

  10. Screening Protocol for Iodine-Specific Getters in YMP-Related Invert Applications

    International Nuclear Information System (INIS)

    This document defines a standardized screening protocol for use in developing iodine ''getters'' for placement in the proposed YMP-repository invert. The work was funded by the US Department of Energy (DOE), Office of Civilian Radioactive Waste Management (OCRWM), Office of Science and Technology International (S and T) during 2004-2005. First, the likely environmental conditions in the invert are reviewed as a basis for defining the thermal and geochemical regimes in which a getter must function. These considerations, then, served as the basis for laying out a hierarchy of materials screening tests (Table 1). An experimental design for carrying out these screening tests follows next. Finally, the latter half of the document develops methods for preparing test solutions with chemistries that relate to various aspects of the YMP-repository environment (or, at least to such representations as were available from program documents late in 2004). Throughout the document priority was given to defining procedures that would quickly screen out unpromising candidate materials with a minimum amount of labor. Hence, the proposed protocol relies on batch tests over relatively short times, and on a hierarchy of short pre-test conditioning steps. So as not to repeat the mistakes (and frustrations) encountered in the past (notably in preparing WIPP test brines) particular care was also given to developing standardized test solution recipes that could be prepared easily and reproducibly. This document is principally intended for use as a decision-making tool in evaluating and planning research activities. It is explicitly NOT a roadmap for qualifying getters for actual placement in the repository. That would require a comprehensive test plan and a substantial consensus building effort. This document is also not intended to provide a complete list of all the tests that individuals may wish to carry out. Various materials will have their own peculiar concerns that will call for

  11. An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    CERN Document Server

    Al-Omari, Saleh Ali K; 10.5121/jgraphhoc.2010.2107

    2010-01-01

    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any...

  12. Developing consistent Landsat data sets for large area applications: the MRLC 2001 protocol

    Science.gov (United States)

    Chander, G.; Huang, C.; Yang, L.; Homer, C.; Larson, C.

    2009-01-01

    One of the major efforts in large area land cover mapping over the last two decades was the completion of two U.S. National Land Cover Data sets (NLCD), developed with nominal 1992 and 2001 Landsat imagery under the auspices of the MultiResolution Land Characteristics (MRLC) Consortium. Following the successful generation of NLCD 1992, a second generation MRLC initiative was launched with two primary goals: (1) to develop a consistent Landsat imagery data set for the U.S. and (2) to develop a second generation National Land Cover Database (NLCD 2001). One of the key enhancements was the formulation of an image preprocessing protocol and implementation of a consistent image processing method. The core data set of the NLCD 2001 database consists of Landsat 7 Enhanced Thematic Mapper Plus (ETM+) images. This letter details the procedures for processing the original ETM+ images and more recent scenes added to the database. NLCD 2001 products include Anderson Level II land cover classes, percent tree canopy, and percent urban imperviousness at 30-m resolution derived from Landsat imagery. The products are freely available for download to the general public from the MRLC Consortium Web site at http://www.mrlc.gov.

  13. Wikis and collaborative writing applications in health care: a scoping review protocol.

    Science.gov (United States)

    Archambault, Patrick Michel; van de Belt, Tom H; Grajales Iii, Francisco J; Eysenbach, Gunther; Aubin, Karine; Gold, Irving; Gagnon, Marie-Pierre; Kuziemsky, Craig E; Turgeon, Alexis F; Poitras, Julien; Faber, Marjan J; Kremer, Jan A M; Heldoorn, Marcel; Bilodeau, Andrea; Légaré, France

    2012-04-11

    The rapid rise in the use of collaborative writing applications (eg, wikis, Google Documents, and Google Knol) has created the need for a systematic synthesis of the evidence of their impact as knowledge translation (KT) tools in the health care sector and for an inventory of the factors that affect their use. While researchers have conducted systematic reviews on a range of software-based information and communication technologies as well as other social media (eg, virtual communities of practice, virtual peer-to-peer communities, and electronic support groups), none have reviewed collaborative writing applications in the medical sector. The overarching goal of this project is to explore the depth and breadth of evidence for the use of collaborative writing applications in health care. Thus, the purposes of this scoping review will be to (1) map the literature on collaborative writing applications; (2) compare the applications' features; (3) describe the evidence of each application's positive and negative effects as a KT intervention in health care; (4) inventory and describe the barriers and facilitators that affect the applications' use; and (5) produce an action plan and a research agenda. A six-stage framework for scoping reviews will be used: (1) identifying the research question; (2) identifying relevant studies within the selected databases (using the EPPI-Reviewer software to classify the studies); (3) selecting studies (an iterative process in which two reviewers search the literature, refine the search strategy, and review articles for inclusion); (4) charting the data (using EPPI-Reviewer's data-charting form); (5) collating, summarizing, and reporting the results (performing a descriptive, numerical, and interpretive synthesis); and (6) consulting knowledge users during three planned meetings. Since this scoping review concerns the use of collaborative writing applications as KT interventions in health care, we will use the Knowledge to Action (KTA

  14. Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol

    CERN Document Server

    Fung, Chi-Hang Fred; Chau, H F; Cai, Qing-yu

    2011-01-01

    Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate is not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.

  15. Full-length protein extraction protocols and gel-based downstream applications in formalin-fixed tissue proteomics.

    Science.gov (United States)

    Tanca, Alessandro; Uzzau, Sergio; Addis, Maria Filippa

    2015-01-01

    Archival formalin-fixed, paraffin-embedded (FFPE) tissue repositories and their associated clinical information can represent a valuable resource for tissue proteomics. In order to make these tissues available for protein biomarker discovery and validation studies, dedicated sample preparation procedures overcoming the intermolecular cross-links introduced by formalin need to be implemented. This chapter describes a full-length protein extraction protocol optimized for downstream gel-based proteomics applications. Using the procedures detailed here, SDS-PAGE, western immunoblotting, GeLC-MS/MS, 2D-PAGE, and 2D-DIGE can be carried out on FFPE tissues. Technical tips, critical aspects, and drawbacks of the method are presented and discussed.

  16. Development of a Multi-Agent m-Health Application Based on Various Protocols for Chronic Disease Self-Management.

    Science.gov (United States)

    Park, Hyun Sang; Cho, Hune; Kim, Hwa Sun

    2016-01-01

    The purpose of this study was to develop and evaluate a mobile health application (Self-Management mobile Personal Health Record: "SmPHR") to ensure the interoperability of various personal health devices (PHDs) and electronic medical record systems (EMRs) for continuous self-management of chronic disease patients. The SmPHR was developed for Android 4.0.3, and implemented according to the optimized standard protocol for each interface of healthcare services adopted by the Continua Health Alliance (CHA). That is, the Personal Area Network (PAN) interface between the application and PHD implements ISO/IEEE 11073-20,601, 10,404, 10,407, 10,415, 10,417, and Bluetooth Health Device Profile (HDP), and EMRs with a wide area network (WAN) interface implement HL7 V2.6; the Health Record Network (HRN) interface implements Continuity of Care Document (CCD) and Continuity of Care Record (CCR). Also, for SmPHR, we evaluated the transmission error rate between the interface using four PHDs and personal health record systems (PHRs) from previous research, with 611 users and elderly people after receiving institutional review board (IRB) approval. In the evaluation, the PAN interface showed 15 (2.4 %) errors, and the WAN and HRN interface showed 13 (2.1 %) errors in a total of 611 transmission attempts. Also, we received opinions regarding SmPHR from 15 healthcare professionals who took part in the clinical trial. Thus, SmPHR can be provided as an interconnected PHR mobile health service to patients, allowing 'plug and play' of PHDs and EMRs through various standard protocols. PMID:26573657

  17. Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation

    CERN Document Server

    Schneider, Thomas

    2012-01-01

    Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most pr

  18. Wikis and collaborative writing applications in healthcare: a scoping review protocol.

    NARCIS (Netherlands)

    Archambault, P.M.; Belt, T.H. van de; Grajales III, F.J.; Eysenbach, G.; Aubin, K.; Gold, I.; Gagnon, M.P.; Kuziemsky, C.E.; Turgeon, A.F.; Poitras, J.; Faber, M.J.; Kremer, J.A.M.; Heldoorn, M.; Bilodeau, A.; Legare, F.

    2012-01-01

    ABSTRACT The rapid rise in the use of collaborative writing applications (eg, wikis, Google Documents, and Google Knol) has created the need for a systematic synthesis of the evidence of their impact as knowledge translation (KT) tools in the health care sector and for an inventory of the factors th

  19. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  20. 基于Canopen协议的VACON变频器的应用%Application of VACON's Frequency Converter Based on Canopen Protocol

    Institute of Scientific and Technical Information of China (English)

    张泽宇; 刘洋; 陈卓; 蒋炜

    2015-01-01

    This article describes the application of the VACON's frequency converter based on CANOPEN protocol. It uses the CAN fieldbus protocol which is widely used in the field of marine electric propulsion. CANOPEN protocol is used in application layer to monitor and control the VACON's frequency converter, which has merits of low cost, convenience and practicality in ship's electric propulsion system.%本文介绍了基于 CANOPEN 协议的 VACON 变频器的应用.采用在船舶电力推进领域应用广泛的现场总线CAN协议,应用层采用CANOPEN协议对VACON变频器进行监测与控制,在船舶电力推进系统中具有成本低廉、开发方便及实用等优点.

  1. An automatic protocol composition checker

    OpenAIRE

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  2. 7 CFR 718.103 - Prevented planted and failed acreage.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Prevented planted and failed acreage. 718.103 Section... APPLICABLE TO MULTIPLE PROGRAMS Determination of Acreage and Compliance § 718.103 Prevented planted and failed acreage. (a) Prevented planting is the inability to plant an eligible crop with proper...

  3. Positive indicators of cattle welfare and their applicability to on-farm protocols

    Directory of Open Access Journals (Sweden)

    Giuseppe De Rosa

    2010-01-01

    Full Text Available Most of the research on animal welfare has focused on the negative aspects of the matter including an array of stress categories, whereas little has been done about the positive states of well being. The present study aims to describe indicators of positive animal welfare suitable for on-farm assessment. Appropriate environmental stimulation favours good welfare and, in an adequately enriched environment, positive indicators of welfare such as play behaviour tend to be more common. In addition, animals are motivated to perform these behaviours only if their primary needs are satisfied. In cattle, beneficial effects of social licking have been observed with positive correlation between being licked vs. milk production and weight gain, respectively. Ruminants are gregarious and a high degree of synchronisation within the herd may indicate a positive welfare state, in particular for subordinate animals. They may be able to meet their basic feeding and resting requirements performing these behaviours when the competition for a particular resource is low, however their welfare state would be improved if they could choose when and where (i.e. along with the other members of the group to perform such behaviours. Due to the reduced applicability (mainly young animals, low feasibility (time consuming and lack of research on reliability, play behaviour, albeit of proven validity, does not appear to be suitable for a rapid implementation in a welfare assessment scheme. Social licking is rarely expressed and its detection may be time consuming and scarcely feasible. Although validity and reliability need more studies, behaviour synchrony seems to be a promising positive welfare indicator as the instantaneous scan sampling technique makes this indicator easily applicable. Recently, a new methodology called “qualitative assessment of animal behaviour” has been developed. The method relies on a number of terms which are freely generated by observers. Thus

  4. Comparative Performance Analysis of Wireless Communication Protocols for Intelligent Sensors and Their Applications

    Directory of Open Access Journals (Sweden)

    Chakkor Saad

    2014-05-01

    Full Text Available The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.

  5. Perfusion computed tomography in colorectal cancer: Protocols, clinical applications and emerging trends

    Institute of Scientific and Technical Information of China (English)

    Guang-Yao Wu; Prasanna Ghimire

    2009-01-01

    Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC). By providing the functional tumor microvasculature, it also helps the assessment of therapeutic response of anti-angiogenic drugs as it may reflect tumor angiogenesis. Perfusion CT has been applied in clinical practice to delineate inflammatory or neoplastic lymph nodes irrespective of their size,identify micro-metastases and to predict metastases in advance of their development. It is of increasing significance for preoperative adjuvant therapies and avoidance of unnecessary interventions. Despite controversies regarding the techniques employed, its validity and reproducibility, it can be advantageous in the management of CRCs in which the prognosis is dependent on preoperative staging. With recent advances in the perfusion CT techniques, and incorporation to other modalities like positron emission tomography, perfusion CT will be a novel tool in the overall management of CRCs. This article aims at reviewing the existing clinical applications and recent advances of perfusion CT with a reference to future development in the management of CRCs.

  6. Intrabody application of eptotermin alpha enhances bone formation in osteoporotic fractures of the lumbar spine; however, fails to increase biomechanical stability - results of an experimental sheep model.

    Science.gov (United States)

    Eschler, Anica; Roepenack, Paula; Herlyn, Philipp Karl Ewald; Roesner, Jan; Martin, Heiner; Vollmar, Brigitte; Mittlmeier, Thomas; Gradl, Georg

    2015-01-01

    This study analyses the effect of eptotermin α application into fractured vertebrae. It is hypothesized that eptotermin α is capable to enhance bony healing of the osteoporotic spine. In 10 Merino sheep osteoporosis induction was performed by ovariectomy, corticosteroid therapy and calcium/phosphorus/vitamin D-deficient diet; followed by standardized creation of lumbar vertebral compression fractures (VCFs) type A3.1 and consecutive fracture reduction/fixation using expandable mesh cages. Randomly, intravertebral eptotermin α (G1) or no augmentation was added (G2). Macroscopic, micro-CT, and biomechanical evaluation assessed bony consolidation two months postoperatively: Micro-CT data revealed bony consolidation for all cases with significant increased callus development for G2 (60%) and BV/TV (bone volume/total volume 73.45%, osteoporotic vertebrae 35.76%). Neither group showed improved biomechanical stability. Eptotermin α enhanced mineralisation in VCFs in an experimental setup with use of cementless augmentation via an expandable cage. However, higher bone mineral density did not lead to superior biomechanical properties.

  7. Simple and Efficient Contract Signing Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

  8. Tractor succeeds where submarine fails

    International Nuclear Information System (INIS)

    When reactor 4 at Canada's Bruce A nuclear power station was shut down because of a coolant blockage in one of the fuel channels, a special ''submarine'' was developed but failed to remove the obstruction. So a tractor was tried instead and proved to be more successful. The problem and eventual solution is discussed. (U.K.)

  9. The Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) - Application in Early Warning Systems for Natural Hazard

    Science.gov (United States)

    Lendholt, Matthias; Hammitzsch, Martin; Wächter, Joachim

    2010-05-01

    The Common Alerting Protocol (CAP) [1] is an XML-based data format for exchanging public warnings and emergencies between alerting technologies. In conjunction with the Emergency Data Exchange Language (EDXL) Distribution Element (-DE) [2] these data formats can be used for warning message dissemination in early warning systems for natural hazards. Application took place in the DEWS (Distance Early Warning System) [3] project where CAP serves as central message format containing both human readable warnings and structured data for automatic processing by message receivers. In particular the spatial reference capabilities are of paramount importance both in CAP and EDXL. Affected areas are addressable via geo codes like HASC (Hierarchical Administrative Subdivision Codes) [4] or UN/LOCODE [5] but also with arbitrary polygons that can be directly generated out of GML [6]. For each affected area standardized criticality values (urgency, severity and certainty) have to be set but also application specific key-value-pairs like estimated time of arrival or maximum inundation height can be specified. This enables - together with multilingualism, message aggregation and message conversion for different dissemination channels - the generation of user-specific tailored warning messages. [1] CAP, http://www.oasis-emergency.org/cap [2] EDXL-DE, http://docs.oasis-open.org/emergency/edxl-de/v1.0/EDXL-DE_Spec_v1.0.pdf [3] DEWS, http://www.dews-online.org [4] HASC, "Administrative Subdivisions of Countries: A Comprehensive World Reference, 1900 Through 1998" ISBN 0-7864-0729-8 [5] UN/LOCODE, http://www.unece.org/cefact/codesfortrade/codes_index.htm [6] GML, http://www.opengeospatial.org/standards/gml

  10. 乐观并发协议在移动计算环境中的应用%Application of Optimistic Concurrency Protocol in Mobile Computing Environment

    Institute of Scientific and Technical Information of China (English)

    帖军; 张宝哲; 王小荣

    2011-01-01

    在移动计算环境中,基本乐观并发协议的事务处理存在并发度低和重启率高等问题.为此,提出一种适用于移动计算环境的乐观事务并发协议一一基于数据读写时间戳的乐观并发控制协议.仿真实验表明,该协议可以提高事务处理的并发度,降低事务重启概率,与基本乐观事务并发控制协议和基于时间戳的乐观事务并发控制协议相比,该协议更适用于移动计算环境.%In mobile computing environment, low concurrency and too many unnecessary transaction restarting exist in original Optimistic Concurrency Control Protocol(OCCP). To solve these problems, a new optimistic transaction concurrency protocol, BOCC-RW, which is based on read and write timestamp, is proposed in mobile computing environment. Simulation experiment shows that the protocol can improve the concurrency of transaction and reduce the probability of transaction restarting. Experiment results show that compared with the original optimistic protocol and optimistic protocol based on timestamp, the BOCC-RW is more applicable in mobile computing environment.

  11. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  12. Why cogeneration development projects fail

    International Nuclear Information System (INIS)

    In this paper cogeneration projects that are organized by developers fail to reach fruition for reasons other than the basic economical or technical soundness of the opportunity. Cogeneration development projects fail because of misunderstanding by the host or other participants of their obligations, inadequate management support by the host organization, regulatory changes, environmental difficulties, overly high expectations of profit, changes in fuel economics, utility policy changes, changing financial markets, and a variety of other issues. Each of these potential problem areas will be discussed briefly, examples will be given, and remedies will be suggested. Most of these potential problems then can be either avoided or attenuated by advanced provisions so that they will not become fatal flaws to project completion

  13. Bioenergetics of the failing heart.

    Science.gov (United States)

    Ventura-Clapier, Renée; Garnier, Anne; Veksler, Vladimir; Joubert, Frédéric

    2011-07-01

    The heart is responsible for pumping blood throughout the blood vessels to the periphery by repeated, rhythmic contractions at variable intensity. As such the heart should permanently adjust energy production to energy utilization and is a high-energy consumer. For this the heart mainly depends on oxidative metabolism for adequate energy production and on efficient energy transfer systems. In heart failure, there is disequilibrium between the work the heart has to perform and the energy it is able to produce to fulfill its needs. This has led to the concept of energy starvation of the failing heart. This includes decreased oxygen and substrate supply, altered substrate utilization, decreased energy production by mitochondria and glycolysis, altered energy transfer and inefficient energy utilization. Mitochondrial biogenesis and its transcription cascade are down-regulated. Disorganization of the cytoarchitecture of the failing cardiomyocyte also participates in energy wastage. Finally, the failing of the cardiac pump, by decreasing oxygen and substrate supply, leads to a systemic energy starvation. Metabolic therapy has thus emerged as an original and promising approach in the treatment heart failure. This article is part of a Special Issue entitled: Mitochondria and Cardioprotection. PMID:20869993

  14. Stability Mechanisms of Laccase Isoforms using a Modified FoldX Protocol Applicable to Widely Different Proteins

    DEFF Research Database (Denmark)

    Christensen, Niels J.; Kepp, Kasper P.

    2013-01-01

    A recent computational protocol that accurately predicts and rationalizes protein multisite mutant stabilities has been extended to handle widely different isoforms of laccases. We apply the protocol to four isoenzymes of Trametes versicolor laccase (TvL) with variable lengths (498–503 residues) ......, and 245, or near substrate, mainly 265, are identified that contribute to stability-function trade-offs, of relevance to the search for new proficient and stable variants of these important industrial enzymes....

  15. Systems with randomly failing repairable components

    DEFF Research Database (Denmark)

    Der Kiureghian, Armen; Ditlevsen, Ove Dalager; Song, Junho

    2005-01-01

    Closed-form expressions are derived for the steady-state availability, mean rate of failure, mean duration of downtime and reliability of a general system with randomly and independently failing repairable components. Component failures are assumed to be homogeneous Poisson events in time...... system performance measures with respect to the mean rate of failure and the mean duration of repair of each component. These expressions provide a convenient framework for identifying important components within the system and for decisionmaking aimed at upgrading the system availability or reliability......, or reducing the mean duration of system downtime. Example applications to an electrical substation system demonstrate the use of the formulas developed in the paper....

  16. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  17. The application of the HT2012 HART○R Modem to the HART protocol%HT2012 HART○RModem在HART协议中的应用

    Institute of Scientific and Technical Information of China (English)

    蔡立虹; 庞彦斌

    2001-01-01

    本文介绍了SMAR公司的HT2012 HART○RModem芯片的特点与功能以及在HART协议物理层中的应用%This paper presents the features and the functions of the Smar HT2012 HART○R Modem and also describes the application of the HT2012 chip to the physical layer of the HART protocol.

  18. Application of MAC protocol in aeronautical Ad Hoc networks%MAC协议在航空自组网中应用综述

    Institute of Scientific and Technical Information of China (English)

    曹振林; 孙荣平; 柏长帅

    2013-01-01

      MAC protocol of aeronautical Ad hoc network is a direct controller of grouping messages in the wireless channel sending and reception. Therefore,in aeronautical Ad Hoc network,it is crucial for the performance of aeronautical Ad Hoc net⁃work whether MAC protocol can efficiently and fairly use the limited wireless channel resources. The MAC functions and the in⁃fluence factors of aeronautical Ad Hoc networks on MAC protocols are summarized in in this paper. MAC protocol characteristics of the wireless Ad Hoc networks and the key technologys of aeronautical Ad Hoc networks are analyzed in combination with the application of MAC in MANET.%  航空自组网MAC协议是分组报文在无线信道上发送和接收的直接控制者,因此,在航空自组网中,MAC协议能否高效、公平地利用有限的无线信道资源对航空自组网的性能起至关重要的作用。概述了MAC的功能作用、航空自组网对MAC协议的影响因素,并结合MAC在MANET中的应用,分析了无线自组网MAC协议的特点和航空自组网MAC协议的关键技术。

  19. Application of Modbus Protocol in Security and Stability Control Device%Modbus协议在安全稳定控制装置中的应用

    Institute of Scientific and Technical Information of China (English)

    司庆华; 徐海波; 颜云松; 许高阳

    2016-01-01

    Modbus协议是应用非常广泛的现场总线之一,市场上有大量支持Modbus通信协议的触摸屏可选作安全稳定控制装置的人机界面.首先介绍Modbus通信协议应用于稳控装置的意义;然后提出一种利用Modbus通信协议的方法,实现安全稳定控制装置内部数据的通信,这种方法不仅使得人机界面更加友好,而且产品开发周期更短,产品可升级扩展性更好.%The Modbus protocol is one of the widely applied field buses. There are a large number of touch screens supporting Modbus protocol on the market, which can be used for human machine interface of security and stability control device. This paper firstly introduces the significance of Modbus protocol's application in the stability control device. Then a method of using Modbus communication protocol is proposed to realize the communication of the data in the security and stability control device. This method not only makes the human machine interface (HMI) more friendly, but also makes the product development cycle shorter, and the scalable extensibility of the product becomes better.

  20. Analysis of the Transport Layer Security protocol

    OpenAIRE

    Firing, Tia Helene

    2010-01-01

    In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these prot...

  1. Internet of Things : Definition, applications and comparison of wifi-based communication protocols for implementation of an irrigation system

    OpenAIRE

    Bruse, Emelie

    2015-01-01

    The aim of this thesis work has been to explore the state of the art of the Internet of Things, IoT. Focus has been put on the role of communication protocols, or middleware, that enable communication between node and hub in the IoT architecture. A literature study has been carried out, where the state of the art of the IoT has been studied. A comparison of six different pieces of middleware has been made, to use as a reference when choosing between communication protocols for a distributed s...

  2. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  3. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  4. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  5. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  6. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  7. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  8. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  9. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  10. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  11. The Ontological Perspectives of the Semantic Web and the Metadata Harvesting Protocol: Applications of Metadata for Improving Web Search.

    Science.gov (United States)

    Fast, Karl V.; Campbell, D. Grant

    2001-01-01

    Compares the implied ontological frameworks of the Open Archives Initiative Protocol for Metadata Harvesting and the World Wide Web Consortium's Semantic Web. Discusses current search engine technology, semantic markup, indexing principles of special libraries and online databases, and componentization and the distinction between data and…

  12. Development of an eco-protocol for seaweed chlorophylls extraction and possible applications in dye sensitized solar cells

    Science.gov (United States)

    Armeli Minicante, S.; Ambrosi, E.; Back, M.; Barichello, J.; Cattaruzza, E.; Gonella, F.; Scantamburlo, E.; Trave, E.

    2016-07-01

    Seaweeds are a reserve of natural dyes (chlorophylls a, b and c), characterized by low cost and easy supply, without potential environmental load in terms of land subtraction, and also complying with the requirements of an efficient waste management policy. In particular, the brown seaweed Undaria pinnatifida is a species largely present in the Venice Lagoon area, and for it a removal strategy is actually mandatory. In this paper, we set-up an eco-protocol for the best extraction and preparation procedures of the pigment, with the aim of finding an easy and affordable method for chlorophyll c extraction, exploring at the same time the possibility of using these algae within local sustainable management integrated strategies, among which the possible use of chlorophylls as a dye source in dye sensitized solar cells (DSSCs) is investigated. Experimental results suggest that the developed protocols are useful to optimize the chlorophyll c extraction, as shown by optical absorption spectroscopy measurements. The DSSCs built with the chlorophyll extracted by the proposed eco-protocol exhibit solar energy conversion efficiencies are similar to those obtained following extraction protocols with larger environmental impacts.

  13. Transdiagnostic treatment using a unified protocol: application for patients with a range of comorbid mood and anxiety disorders

    Directory of Open Access Journals (Sweden)

    Ana Claudia C. de Ornelas Maia

    2013-01-01

    Full Text Available OBJECTIVE: To evaluate the effectiveness of a unified cognitive-behavioral therapy protocol for group treatment of patients with a range of comorbid mood and anxiety disorders. METHODS: In this open-trial study, the unified protocol was followed for the psychotherapeutic treatment of 16 patients with comorbid mood and anxiety disorders, confirmed by the Mini International Neuropsychiatric Interview. Beck Depression and Anxiety Inventories, the World Health Organization Quality of Life evaluation instrument, and the ARIZONA scale of sexual function were used to evaluate progress in patients throughout the therapeutic process. RESULTS: All patients showed unipolar depressive disorder. Comorbidity with anxiety disorders was distributed as follows: generalized anxiety disorder, 13 (81.3%; panic disorder, 3 (18.8%; social anxiety disorder, 1 (6.3%; and post-traumatic stress disorder, 1 (6.3%. Improvement was observed in the signs and symptoms of depression (F = 78.62, p < 0.001 and anxiety (F = 19.64, p < 0.001, overall quality of life (F = 39.72, p < 0.001, physical domain (F = 28.15, p < 0.001, psychological variables (F = 9.90, p = 0.007, social functioning (F = 36.86, p < 0.001, environmental variables (F = 27.63, p < 0.001, and sexuality (F = 13.13; p < 0.005. All parameters showed highly significant correlations (p < 0.01. CONCLUSION: An effort to establish one unified treatment protocol for a whole family of emotional disorders (primarily mood and anxiety disorders showed benefits in the field of clinical psychology and for the treatment of patients. No other data were found in the literature describing the implementation of the unified protocol in a transdiagnostic group. Our results revealed statistically significant improvement in all variables, suggesting that the protocol proposed can become an important tool to improve quality of life, sexuality, and anxiety/depression symptoms in patients with different diagnoses.

  14. Why good projects fail anyway.

    Science.gov (United States)

    Matta, Nadim F; Ashkenas, Ronald N

    2003-09-01

    Big projects fail at an astonishing rate--more than half the time, by some estimates. It's not hard to understand why. Complicated long-term projects are customarily developed by a series of teams working along parallel tracks. If managers fail to anticipate everything that might fall through the cracks, those tracks will not converge successfully at the end to reach the goal. Take a companywide CRM project. Traditionally, one team might analyze customers, another select the software, a third develop training programs, and so forth. When the project's finally complete, though, it may turn out that the salespeople won't enter in the requisite data because they don't understand why they need to. This very problem has, in fact, derailed many CRM programs at major organizations. There is a way to uncover unanticipated problems while the project is still in development. The key is to inject into the overall plan a series of miniprojects, or "rapid-results initiatives," which each have as their goal a miniature version of the overall goal. In the CRM project, a single team might be charged with increasing the revenues of one sales group in one region by 25% within four months. To reach that goal, team members would have to draw on the work of all the parallel teams. But in just four months, they would discover the salespeople's resistance and probably other unforeseen issues, such as, perhaps, the need to divvy up commissions for joint-selling efforts. The World Bank has used rapid-results initiatives to great effect to keep a sweeping 16-year project on track and deliver visible results years ahead of schedule. In taking an in-depth look at this project, and others, the authors show why this approach is so effective and how the initiatives are managed in conjunction with more traditional project activities.

  15. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...... no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n=3 players. Following the presentation of VIFF, we turn to a more theoretical subject...

  16. Rational Protocols

    Science.gov (United States)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  17. 40 CFR 205.160-6 - Passing or failing under SEA.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Passing or failing under SEA. 205.160... failing under SEA. (a) A failing vehicle is one whose measured noise level is in excess of the applicable... vehicles is less than or equal to the number in Column A, the sample passes. (c) Pass or failure of an...

  18. Application of the Putting Women First protocol in a study on violence against immigrant women in Spain.

    Science.gov (United States)

    Torrubiano-Domínguez, Jordi; Vives-Cases, Carmen

    2013-01-01

    In this paper, we describe our experience of using the Putting Women First protocol in the design and implementation of a cross-sectional study on violence against women (VAW) among 1607 immigrant women from Morocco, Ecuador and Romania living in Spain in 2011. The Putting Women First protocol is an ethical guideline for VAW research, which includes recommendations to ensure the safety of the women involved in studies on this subject. The response rate in this study was 59.3%. The prevalence of VAW cases last year was 11.7%, of which 15.6% corresponded to Ecuadorian women, 10.9% to Moroccan women and 8.6% to Romanian women. We consider that the most important goal for future research is the use of VAW scales validated in different languages, which would help to overcome the language barriers encountered in this study.

  19. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  20. Clinical applicability and cutoff values for an unstructured neuropsychological assessment protocol for older adults with low formal education.

    Directory of Open Access Journals (Sweden)

    Jonas Jardim de Paula

    Full Text Available BACKGROUND AND OBJECTIVES: The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. METHODS AND RESULTS: A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. CONCLUSION: The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education.

  1. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study

    OpenAIRE

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-01-01

    Background: High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing o...

  2. Protocol: a rapid and economical procedure for purification of plasmid or plant DNA with diverse applications in plant biology

    Directory of Open Access Journals (Sweden)

    Li Li

    2010-01-01

    Full Text Available Abstract Research in plant molecular biology involves DNA purification on a daily basis. Although different commercial kits enable convenient extraction of high-quality DNA from E. coli cells, PCR and agarose gel samples as well as plant tissues, each kit is designed for a particular type of DNA extraction work, and the cost of purchasing these kits over a long run can be considerable. Furthermore, a simple method for the isolation of binary plasmid from Agrobacterium tumefaciens cells with satisfactory yield is lacking. Here we describe an easy protocol using homemade silicon dioxide matrix and seven simple solutions for DNA extraction from E. coli and A. tumefaciens cells, PCR and restriction digests, agarose gel slices, and plant tissues. Compared with the commercial kits, this protocol allows rapid DNA purification from diverse sources with comparable yield and purity at negligible cost. Following this protocol, we have demonstrated: (1 DNA fragments as small as a MYC-epitope tag coding sequence can be successfully recovered from an agarose gel slice; (2 Miniprep DNA from E. coli can be eluted with as little as 5 μl water, leading to high DNA concentrations (>1 μg/μl for efficient biolistic bombardment of Arabidopsis seedlings, polyethylene glycol (PEG-mediated Arabidopsis protoplast transfection and maize protoplast electroporation; (3 Binary plasmid DNA prepared from A. tumefaciens is suitable for verification by restriction analysis without the need for large scale propagation; (4 High-quality genomic DNA is readily isolated from several plant species including Arabidopsis, tobacco and maize. Thus, the silicon dioxide matrix-based DNA purification protocol offers an easy, efficient and economical way to extract DNA for various purposes in plant research.

  3. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  4. Optimised to Fail: Card Readers for Online Banking

    Science.gov (United States)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  5. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998; Projet de loi portant application du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France, signe a Vienne le 22 septembre 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-04-15

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  6. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  7. Application of an Image Cytometry Protocol for Cellular and Mitochondrial Phenotyping on Fibroblasts from Patients with Inherited Disorders

    DEFF Research Database (Denmark)

    Fernandez-Guerra, Paula; Lund, Martin; Corydon, T J;

    2015-01-01

    on a parallel one. We analysed HDFs from healthy individuals after treatment with various concentrations of hydrogen peroxide (H2O2) for different intervals, to mimic the physiological effects of oxidative stress. Our results show that cell number, viability, TRS and MMP decreased, while MSL increased both...... one. HDFs from both patients displayed increased MSL without H2O2 treatment. Treatment with H2O2 revealed significant differences in MMP and MSL between HDFs from the mild and the severe patient. Our results establish the capacity of our protocol for fast analysis of cellular and mitochondrial...

  8. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  9. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    Science.gov (United States)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  10. A protocol to convert spatial polyline data to network formats and applications to world urban road networks.

    Science.gov (United States)

    Karduni, Alireza; Kermanshah, Amirhassan; Derrible, Sybil

    2016-06-21

    The study of geographical systems as graphs, and networks has gained significant momentum in the academic literature as these systems possess measurable and relevant network properties. Crowd-based sources of data such as OpenStreetMaps (OSM) have created a wealth of worldwide geographic information including on transportation systems (e.g., road networks). In this work, we offer a Geographic Information Systems (GIS) protocol to transfer polyline data into a workable network format in the form of; a node layer, an edge layer, and a list of nodes/edges with relevant geographic information (e.g., length). Moreover, we have developed an ArcGIS tool to perform this protocol on OSM data, which we have applied to 80 urban areas in the world and made the results freely available. The tool accounts for crossover roads such as ramps and bridges. A separate tool is also made available for planar data and can be applied to any line features in ArcGIS.

  11. A protocol to convert spatial polyline data to network formats and applications to world urban road networks.

    Science.gov (United States)

    Karduni, Alireza; Kermanshah, Amirhassan; Derrible, Sybil

    2016-01-01

    The study of geographical systems as graphs, and networks has gained significant momentum in the academic literature as these systems possess measurable and relevant network properties. Crowd-based sources of data such as OpenStreetMaps (OSM) have created a wealth of worldwide geographic information including on transportation systems (e.g., road networks). In this work, we offer a Geographic Information Systems (GIS) protocol to transfer polyline data into a workable network format in the form of; a node layer, an edge layer, and a list of nodes/edges with relevant geographic information (e.g., length). Moreover, we have developed an ArcGIS tool to perform this protocol on OSM data, which we have applied to 80 urban areas in the world and made the results freely available. The tool accounts for crossover roads such as ramps and bridges. A separate tool is also made available for planar data and can be applied to any line features in ArcGIS. PMID:27327129

  12. Fast and easy protocol for the purification of recombinant S-layer protein for synthetic biology applications

    KAUST Repository

    Norville, Julie E.

    2011-06-17

    A goal of synthetic biology is to make biological systems easier to engineer. One of the aims is to design, with nanometer-scale precision, biomaterials with well-defined properties. The surface-layer protein SbpA forms 2D arrays naturally on the cell surface of Lysinibacillus sphaericus, but also as the purified protein in solution upon the addition of divalent cations. The high propensity of SbpA to form crystalline arrays, which can be simply controlled by divalent cations, and the possibility to genetically alter the protein, make SbpA an attractive molecule for synthetic biology. To be a useful tool, however, it is important that a simple protocol can be used to produce recombinant wild-type and modified SbpA in large quantities and in a biologically active form. The present study addresses this requirement by introducing a mild and non-denaturing purification protocol to produce milligram quantities of recombinant, active SbpA.

  13. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    International Nuclear Information System (INIS)

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met

  14. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  15. Design of the Network Monitoring Applications Using SNMP (Simple Network Management Protocol with Early Warning System and Network Mapping

    Directory of Open Access Journals (Sweden)

    Muazam Nugroho

    2014-03-01

    Full Text Available Simple Network Management Protocol (SNMP adalah sebuah protokol yang digunakan untuk kebutuhan monitoring pada jaringan komputer. Dalam bekerja, SNMP terdiri dari Network Management Station (NMS atau manager dan SNMP agent. NMS berfungsi sebagai mesin pengolahan informasi dari perangkat-perangkat jaringan yang dipantau (yang disebut sebagai SNMP agent. SNMP agent  terimplementasi  pada manageable node seperti router, server, dan perangkat jaringan lainnya.Pada periode sebelumnya,di Laboratorium Jaringan Telekomunikasi Jurusan Teknik Elektro ITS telah dibuat tiga sistem monitoring jaringan, yaitu network monitor yang dilengkapi dengan database, sistem peringatan dini, dan pemetaan jaringan (Network Mapping. Ketiga sistem ini masih berdiri sendiri, sehingga perlu dilakukan integrasi agar didapat suatu sistem yang memiliki fungsi lengkap.Dalam tugas akhir ini dilakukan perancangan dan pembuatan suatu Network Monitoring System yang merupakan integrasi antara Network Monitoring, Network Mapping, dan Sistem Peringatan Dini.

  16. Quercetin-imprinted chromatographic sorbents revisited: optimization of synthesis and rebinding protocols for application to natural resources.

    Science.gov (United States)

    Pardo, Antonelle; Mespouille, Laetitia; Blankert, Bertrand; Trouillas, Patrick; Surin, Mathieu; Dubois, Philippe; Duez, Pierre

    2014-10-17

    Molecularly imprinted polymers (MIPs) based on quercetin and synthesized by either bulk, precipitation or suspension polymerization were characterized in terms of size and shape by scanning electron microscopy (SEM) and transmission electron microscopy (TEM). After a study of rebinding protocols, the optimal materials were evaluated as sorbents for solid-phase extraction (SPE) and high-performance liquid chromatography (HPLC) to confirm the presence of imprinted cavities and to assess their selectivity. Besides quercetin, other structurally related natural compounds, naringenin, daidzein and curcumin, were employed for selectivity tests of MIPs. Although rebinding protocols previously described for such MIPs are typically based on binding, washing and eluting methanol-based solutions, we show that this highly polar solvent leads to weak specific interactions (imprinting factor2.4). This calls for reviewing most of previously published data on quercetin-MIPs; in proper binding conditions, published MIPs may prove more performing than initially assessed. As expected, tested MIPs exhibited the highest selective rebinding towards quercetin template (imprinting effect, quercetin, 3.41; naringenin, 1.54; daidzein, 1.38; curcumin, 1.67); the differences in selectivity between quercetin analogues were explained by the ligand geometries and H-bonding patterns obtained from quantum-chemical calculations. The evaluation of MIPs under identical analytical conditions allowed investigating the effect of the production method on chromatographic performances. The MIPs in bead materials (for quercetin, peak width, 0.69; number of theoretical plates, 143; symmetry factor, 2.22) provided a significant improvement in chromatographic efficiency over the bulk materials (for quercetin, peak width, 1.25; number of theoretical plates, 115; symmetry factor, 2.92). Using the quercetin-beaded MIP as SPE sorbent, quercetin was selectively extracted from Allium cepa L. extract. The MIP

  17. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  18. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  19. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998

  20. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna

  1. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  2. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  3. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  4. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  5. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna

  6. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria

  7. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  8. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000

  9. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  10. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  11. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  12. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  13. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  14. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  15. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria

  16. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  17. Application of MQTT Protocol to Instant Communicationin Mobile Internet%MQTT协议在移动互联网即时通信中的应用

    Institute of Scientific and Technical Information of China (English)

    马跃; 孙翱; 贾军营; 孙建伟; 于碧辉; 杨雪华

    2016-01-01

    移动互联网下的即时通信应用现今已经成为人们日常沟通必不可少的工具,然而作为其开发基础的即时通信协议却始终没有一个统一的标准,已有的即时通信协议都不能够很好的适应移动互联网网络环境不稳定,低带宽高延迟,设备计算能力差等特点.MQTT协议作为一种基于发布/订阅模型的轻量级消息传输协议,在移动平台具有节省流量和能耗,可扩展性强的优点.本文首先介绍了当前一些主流的即时通信协议,指出了它们在移动互联网环境下存在哪些缺陷;之后研究了MQTT协议的消息格式与使用方式,并与已有的即时通信协议进行了对比;最后基于MQTT协议,对即时通信应用的两项核心功能IM和Presence进行了设计和实现,并经过测试表明使用MQTT协议能够在移动互联网环境下提供比传统即时通信协议更少的带宽耗费和更良好的用户体验.%Instant communication applications in Mobile Internet have become an indispensable part for people's daily communication nowadays. The real-time communication protocol, which is the basis for the development of instant communication applications, however, has no unified standard. The existing real-time communication protocols are not able to perfectly adapt to mobile Internet, which has a constrained network environment with the characteristics of low-bandwidth, limited processing capabilities and high latency. MQTT is a publish/subscribe based, extremely simple and lightweight messaging protocol, whose design principle is to minimize the network bandwidth and device resource requirements. This article first introduces some existing mainstream instant communication protocols and points out their shortcomings in mobile Internet environment. The second part introduces MQTT protocol briefly and studies the format and interaction process of MQTT message. Finally, based on MQTT, the article puts forward an implementation of IM and

  18. Comparison between absorbed dose to water standards established by water calorimetry at the LNE-LNHB and by application of international air-kerma based protocols for kilovoltage medium energy x-rays.

    Science.gov (United States)

    Perichon, N; Rapp, B; Denoziere, M; Daures, J; Ostrowsky, A; Bordy, J-M

    2013-05-01

    Nowadays, the absorbed dose to water for kilovoltage x-ray beams is determined from standards in terms of air-kerma by application of international dosimetry protocols. New standards in terms of absorbed dose to water has just been established for these beams at the LNE-LNHB, using water calorimetry, at a depth of 2 cm in water in accordance with protocols. The aim of this study is to compare these new standards in terms of absorbed dose to water, to the dose values calculated from the application of four international protocols based on air-kerma standards (IAEA TRS-277, AAPM TG-61, IPEMB and NCS-10). The acceleration potentials of the six beams studied are between 80 and 300 kV with half-value layers between 3.01 mm of aluminum and 3.40 mm of copper. A difference between the two methods smaller than 2.1% was reported. The standard uncertainty of water calorimetry being below 0.8%, and the one associated with the values from protocols being around 2.5%, the results are in good agreement. The calibration coefficients of some ionization chambers in terms of absorbed dose to water, established by application of calorimetry and air-kerma based dosimetry protocols, were also compared. The best agreement with the calibration coefficients established by water calorimetry was found for those established with the AAPM TG-61 protocol.

  19. Is journalism failing on climate?

    Science.gov (United States)

    Rahmstorf, Stefan

    2012-12-01

    How can we build a reliable and affordable energy supply based on renewables? How rapidly do we need to cut greenhouse gas emissions to keep climate change within manageable bounds? What does it take to maintain a stable common currency of different nations? These are just a few examples of questions that are critical for our future and that require an understanding of complex systems—the energy system, the climate system, the financial system. Finding sound answers to these questions requires sophisticated scientific analysis and expert knowledge; a lay person's intuition will clearly not suffice. Yet, decisions in a democracy are (and should be!) taken by politicians and the voting public who are not usually scientific experts. Hence the well-being of our societies—and even more so the living conditions of future generations, which are defined by the decisions we take today—depends on the wider public being well informed about the state of scientific knowledge and discourse. The media are the most important means by which lay people obtain their information about science. Good science journalism is therefore a decisive factor for the long-term success of modern society. Good science journalism clearly must be critical journalism, and it requires journalists who know what is what, who can put things into a perspective, and who are able to make well-informed judgements. After all, the role of science journalism is not simply to act as a 'translator' who conveys the findings of scientists in a language understandable to lay people. Rather, good science journalism will provide the public with a realistic impression of what is well established in science and what are current 'hot topics', uncertainties and controversies. It will also discuss the methods and social context of the scientific endeavour. There is ample evidence that in the area of climate science, journalism too often is failing to deliver this realistic picture to its audience, despite many good

  20. Cryptanalysis of Song's advanced smart card based password authentication protocol

    CERN Document Server

    Tapiador, Juan E; Peris-Lopez, P; Clark, John A

    2011-01-01

    Song \\cite{Song10} proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng \\cite{XZF09}. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.

  1. Smoke and mirrors: the Kyoto Protocol and beyond

    NARCIS (Netherlands)

    Kooten, van G.C.

    2003-01-01

    The Kyoto Protocol is considered a necessary first step toward an effective future climate accord. As argued in this paper, however, the protocol will likely fail because it has too many loopholes, inadequate governance structures, and insufficient compliance provisions. This view is supported by ca

  2. Reasons why patients fail screening in Indian breast cancer trials

    Directory of Open Access Journals (Sweden)

    P Mahajan

    2015-01-01

    Full Text Available Introduction: An increased number of screen failure patients in a clinical trial increases time and cost required for the recruitment. Assessment of reasons for screen failure can help reduce screen failure rates and improve recruitment. Materials and Methods: We collected retrospective data of human epidermal growth factor receptor (HER2 positive Indian breast cancer patients, who failed screening for phase 3 clinical trials and ascertained their reasons for screen failure from screening logs. Statistical comparison was done to ascertain if there are any differences between private and public sites. Results: Of 727 patients screened at 14 sites, 408 (56.1% failed screening. The data on the specific reasons for screen failures was not available at one of the public sites (38 screen failures out of 83 screened patients. Hence, after excluding that site, further analysis is based on 644 patients, of which 370 failed screening. Of these, 296 (80% screen failure patients did not meet selection criteria. The majority -266 were HER2 negative. Among logistical issues, 39 patients had inadequate breast tissue sample. Sixteen patients withdrew their consent at private sites as compared to six at public sites. The difference between private and public sites for the above three reasons was statistically significant. Conclusion: Use of prescreening logs to reduce the number of patients not meeting selection criteria and protocol logistics, and patient counseling to reduce consent withdrawals could be used to reduce screen failure rate.

  3. Application of Induced Containment Therapy with adapted protocol for home care and its contributions to the motor condition and patient rehabilitation after encephalic vascular accident

    Directory of Open Access Journals (Sweden)

    Daniela Tonús

    2015-09-01

    Full Text Available Introduction: Encephalic Vascular Accident (EVA is among the most important diseases that cause physical and functional limitations. Hemiplegia is the most common physical changes post-EVA, as compromises the upper and lower limbs at the same side of the body, characterized by a rigid pattern of the flexor muscles of the upper limb and the extensor muscles of the lower limb. The Induced Containment Therapy has been a major rehabilitation technique recently aiming to promote functional improvement of the hemiplegic limb of those who suffered EVA and enable performance and quality of life of the individual. Objective: This study aimed to identify the possible contributions of Induced Containment Therapy using a protocol adapted to technique application to the hemiplegic limb. Moreover, this research points out the influence of the environment interventions, which on the present study, occurred in the participant’s home. Method: this is a case study with exploratory feature. Results and Conclusion: The results indicated improvements in functional ability at the time of execution of the tasks and increased use of hemiplegic limb, increasing motor performance after applying the Induced Containment Therapy adapted protocol compared to the start of treatment

  4. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  5. When Organization Fails: Why Authority Matters

    DEFF Research Database (Denmark)

    Blaschke, Steffen

    2015-01-01

    Review of: James R. Taylor and Elizabeth J. Van Every / When Organization Fails: Why Authority Matters. (New York: Routledge, 2014. 220 pp. ISBN: 978 0415741668)......Review of: James R. Taylor and Elizabeth J. Van Every / When Organization Fails: Why Authority Matters. (New York: Routledge, 2014. 220 pp. ISBN: 978 0415741668)...

  6. Is journalism failing on climate?

    Science.gov (United States)

    Rahmstorf, Stefan

    2012-12-01

    How can we build a reliable and affordable energy supply based on renewables? How rapidly do we need to cut greenhouse gas emissions to keep climate change within manageable bounds? What does it take to maintain a stable common currency of different nations? These are just a few examples of questions that are critical for our future and that require an understanding of complex systems—the energy system, the climate system, the financial system. Finding sound answers to these questions requires sophisticated scientific analysis and expert knowledge; a lay person's intuition will clearly not suffice. Yet, decisions in a democracy are (and should be!) taken by politicians and the voting public who are not usually scientific experts. Hence the well-being of our societies—and even more so the living conditions of future generations, which are defined by the decisions we take today—depends on the wider public being well informed about the state of scientific knowledge and discourse. The media are the most important means by which lay people obtain their information about science. Good science journalism is therefore a decisive factor for the long-term success of modern society. Good science journalism clearly must be critical journalism, and it requires journalists who know what is what, who can put things into a perspective, and who are able to make well-informed judgements. After all, the role of science journalism is not simply to act as a 'translator' who conveys the findings of scientists in a language understandable to lay people. Rather, good science journalism will provide the public with a realistic impression of what is well established in science and what are current 'hot topics', uncertainties and controversies. It will also discuss the methods and social context of the scientific endeavour. There is ample evidence that in the area of climate science, journalism too often is failing to deliver this realistic picture to its audience, despite many good

  7. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met

  8. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  9. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  10. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  11. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  12. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  13. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  14. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  15. Treatment for TMD with occlusal splint and electromyographic control: application of the FARC protocol in a Brazilian population.

    Science.gov (United States)

    Vieira e Silva, Carolina A; da Silva, Marco Antônio M Rodrigues; Melchior, Melissa de Oliveira; de Felício, Cláudia Maria; Sforza, Chiarella; Tartaglia, Gianluca M

    2012-07-01

    The purpose of this study was to apply Functional Anatomy Research Center (FARC) Protocol of TMD treatment, which includes the use of a specific type of mandibular occlusal splint, adjusted based on the electromyographic index, in a group of 15 patients with disc displacement, classified according to the Research Diagnostic Criteria for Temporomandibular Disorders (RDC/TMD) and then analyzing the results compared with the control group. The clinical evaluations were completed both before and after the treatment. Electromyographic (EMG) data was collected and recorded on the day the splint was inserted (visit 1), after one week (visit 2) and after five weeks of treatment (visit 3). The control group consisted of 15 asymptomatic subjects, according to the same diagnostic criteria (RDC/TMD), who were submitted to the same evaluations with the same interval periods as the treatment group. Immediately after splint adjustment, masseter muscle symmetry and total muscular activity were significantly different with than without the splint (p < 0.05), showing an increased neuromuscular coordination. After treatment, significant variations (p < .05) were found in mouth opening and in pain remission. There were no significant differences among the three sessions, either with or without the splint. There were significant differences between the TMD and control groups for all analyzed indices of muscular symmetry, activity and torque, with the exception of total muscular activity. The use of the splint promoted balance of the EMG activities during its use, relieving symptoms. EMG parameters identified neuromuscular imbalance, and allowed an objective analysis of different phases of TMD treatment, differentiating individuals with TMD from the asymptomatic subjects.

  16. Securing VOIP networks via Transport protocols Layer

    Directory of Open Access Journals (Sweden)

    M. M. Moon

    2012-09-01

    Full Text Available Voice over Internet Protocol (VoIP, is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog phone line. VoIP services have compelling technical advantages over circuit switching. VoIP networks are based more on an open architecture than that of their circuit-switched contemporaries. This open, standards-based architecture means that VoIP services are more interchangeable and more modular than that of a proprietary, monolithic voice switch. One can now select best-in-class products without being tied to one specific vendor. Open standards also translates into the realization of new services that one can rapidly develop and deploy rather than waiting for a particular vendor to develop a proprietary solution. Moreover, VoIP is suitable for CTI (Computer Telephony Integration and other next-generation applications, which are insightful when looking to future networks that, provide enhanced services. VoIP traffic has a number of issues that should be carefully considered, such as traffic parameters and network design. Without such due diligence, one could be faced with service that does not function reliably or is severely degraded. These important considerations are Latency, Jitter, Bandwidth, Packet Loss, Reliability & Security. In this paper, the focus shall be on the Security aspect, its threat and measures to prevent it on various layers of the VOIP protocol. One of the common mistakes when approaching Voice over IP Security is to treat this technology and its applications like all other network-based applications and therefore use classical security measures. This approach fails to consider the fundamental property that makes VoIP different from classical network-aware technologies: Voice over IP is time critical. It demands Quality of Service (QoS and is generally deployed over an environment where QoS does not exist as a standard feature. In this proposed research, we examine

  17. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  18. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  19. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life Using a Smartphone Application.

    Science.gov (United States)

    Mareva, Silvana; Thomson, David; Marenco, Pietro; Estal Muñoz, Víctor; Ott, Caroline V; Schmidt, Barbara; Wingen, Tobias; Kassianos, Angelos P

    2016-01-01

    Health-Related Quality of Life (HRQoL) is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2 weeks, they will complete a retrospective assessment of their HRQoL and they will provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same 2-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g., mood, activities), the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for routine HRQoL assessment. The direct comparison of real

  20. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life using a Smartphone Application

    Directory of Open Access Journals (Sweden)

    Silvana Mareva

    2016-07-01

    Full Text Available Health-Related Quality of Life (HRQoL is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money travelling to receive assessment. Ecological Momentary Assessment (EMA is an alternative, as mobile assessment using mobile health (mHealth technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 420 students from seven different universities across Europe. Participants will be prompted by the application to report their real-time HRQoL over two weeks together with information on mood and current activities. At the end of two weeks, students will complete a retrospective assessment of their HRQoL and provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same two-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g. mood, activities, the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for

  1. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life Using a Smartphone Application.

    Science.gov (United States)

    Mareva, Silvana; Thomson, David; Marenco, Pietro; Estal Muñoz, Víctor; Ott, Caroline V; Schmidt, Barbara; Wingen, Tobias; Kassianos, Angelos P

    2016-01-01

    Health-Related Quality of Life (HRQoL) is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2 weeks, they will complete a retrospective assessment of their HRQoL and they will provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same 2-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g., mood, activities), the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for routine HRQoL assessment. The direct comparison of real

  2. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life Using a Smartphone Application

    Science.gov (United States)

    Mareva, Silvana; Thomson, David; Marenco, Pietro; Estal Muñoz, Víctor; Ott, Caroline V.; Schmidt, Barbara; Wingen, Tobias; Kassianos, Angelos P.

    2016-01-01

    Health-Related Quality of Life (HRQoL) is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2 weeks, they will complete a retrospective assessment of their HRQoL and they will provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same 2-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g., mood, activities), the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for routine HRQoL assessment. The direct comparison of real

  3. Effectiveness of a smartphone application for improving healthy lifestyles, a randomized clinical trial (EVIDENT II) : study protocol

    OpenAIRE

    Recio Rodríguez, Jose I.; Martín Cantera, Carlos; González Viejo, Natividad; Gómez Arranz, Amparo; Arietaleanizbeascoa, Maria S.; Schmolling Guinovart, Yolanda; Maderuelo Fernández, José Ángel; Pérez Arechaederra, Diana; Rodriguez-Sanchez, Emiliano; Gómez Marcos, Manuel Ángel; García Ortiz, Luís

    2014-01-01

    Background: New technologies could facilitate changes in lifestyle and improve public health. However, no large randomized, controlled studies providing scientific evidence of the benefits of their use have been made. The aims of this study are to develop and validate a smartphone application, and to evaluate the effect of adding this tool to a standardized intervention designed to improve adherence to the Mediterranean diet and to physical activity. An evaluation is also made of the effect o...

  4. Application of the Intervention Mapping protocol to develop Keys, a family child care home intervention to prevent early childhood obesity

    OpenAIRE

    Mann, Courtney M.; Ward, Dianne S.; Vaughn, Amber; Benjamin Neelon, Sara E.; Long Vidal, Lenita J.; Omar, Sakinah; Namenek Brouwer, Rebecca J.; Østbye, Truls

    2015-01-01

    Background Many families rely on child care outside the home, making these settings important influences on child development. Nearly 1.5 million children in the U.S. spend time in family child care homes (FCCHs), where providers care for children in their own residences. There is some evidence that children in FCCHs are heavier than those cared for in centers. However, few interventions have targeted FCCHs for obesity prevention. This paper will describe the application of the Intervention M...

  5. B Vitamins Fail to Prevent Alzheimer's

    Science.gov (United States)

    ... ARTICLES CLICK HERE B Vitamins Fail to Prevent Alzheimer’s Many people take B vitamins in the hopes ... Finder See All articles W e can end Alzheimer's Support the pioneering research of Nobel Laureate Dr. ...

  6. 合并规制“破产公司抗辩”原则的应用及启示--以英国Kingfisher及Stericycle公司收购案为例%Application and Inspiration of Failing Firm Defense in Merger Control:Based on Kingfisher Acquisition of 30 Former Focus Stores and Stericycle Acquisition of SRCL in UK

    Institute of Scientific and Technical Information of China (English)

    林燕; 马海峰

    2015-01-01

    Merger is a path of recovery for failing companies but it might be alleged monopoly. This paper researches how anti-trust organizations regulate merger with Failing Firm Defense based on the cases of acquisitions of UK Kingfisher and Stericy-cle. Thus this paper puts forward the application rules of Failing Firm Defense that on one side antitrust law should add speed-ing process;on the other side aiming failing firm defense antitrust authority should assess the real reasons that lead to failing, preventing purchasers intend to plunges acquired firms into debt by malicious competition which will weaken competition and consumer interests.%合并是濒临破产公司的一条重生之路,但这可能会涉嫌垄断。以英国Kingfisher及Stericycle公司收购案为例,本文探讨反垄断机构如何运用“破产公司抗辩”原则进行合并审查,从而明晰“破产公司抗辩”实施的要点。结论是反垄断法应当增加加速程序的相应规定;对以破产抗辩为理由提出的合并申请,应评估导致一家公司濒临倒闭的真实原因,避免一方恶意竞争导致另一方陷入危机,再以破产公司抗辩为理由而成功购并其竞争对手,最终弱化市场竞争,损害消费者利益。

  7. Wifi, WiMax and LTE multi-hop mesh networks basic communication protocols and application areas

    CERN Document Server

    Wei, Hung-Yu; Dixit, Sudhir

    2013-01-01

    Wifi, WiMAX, and Cellular Multihop Networks presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in

  8. LOARP: A Low Overhead Routing Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rony Hasinur Rahman

    2013-02-01

    Full Text Available Underwater wireless communications among underwater sensor nodes enable a large number of scientific, environmental and military applications. For example, autonomous underwater vehicles will enable exploration of deep sea resources and gathering of scientific data for collaborative missions. In order to make underwater applications possible, real-time communication protocols among underwater devices must be enabled. Because of the high attenuation and scattering effect of radio and optical waves, respectively, these underwater devices are based on acoustic wireless technology. The unique characteristics of underwater acoustic channel - such as distance-dependent limited bandwidth and high propagation delays, require new, efficient and reliable communication protocols over multiple hops to network multiple devices which may be either static or mobile. This paper proposes a new low overhead ad hoc routing protocol designed for underwater acoustic sensor network. The protocol performs route discovery when needed in an on-demand manner. It also characterises a route maintenance phase which tries to recover a failed route. Detection of route failure can generate a lot of routing traffic. The proposed protocol tries to minimize this routing traffic by detecting failure in a more intelligent way either by monitoring network data traffic (if present or generating lazy acknowledgements (if necessary. Reducing routing traffic minimizes the chance of packet collisions which in turn increases data packet delivery ratio. The performance of the proposed protocol is measured in terms of network throughput, packet delivery ratio, average endto-end delay and control overhead. The results are compared to those obtained using similar on-demand routing protocols. Simulation results show that the reduction of routing trafficcan improve the performance of the network.

  9. TinyCoAP: A Novel Constrained Application Protocol (CoAP Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS

    Directory of Open Access Journals (Sweden)

    Anna Calveras

    2013-05-01

    Full Text Available In this paper we present the design and implementation of the Constrained Application Protocol (CoAP for TinyOS, which we refer to as TinyCoAP. CoAP seeks to apply the same application transfer paradigm and basic features of HTTP to constrained networks, while maintaining a simple design and low overhead. The design constraints of Wireless Sensor Networks (WSNs require special attention in the design process of the CoAP implementation. We argue that better performance and minimal resource consumption can be achieved developing a native library for the operating system embedded in the network. TinyOS already includes in its distribution an implementation of CoAP called CoapBlip. However, this is based on a library not originally designed to meet the requirements of TinyOS. We demonstrate the effectiveness of our approach by a comprehensive performance evaluation. In particular, we test and evaluate TinyCoAP and CoapBlip in a real scenario, as well as solutions based on HTTP. The evaluation is performed in terms of latency, memory occupation, and energy consumption. Furthermore, we evaluate the reliability of each solution by measuring the goodput obtained in a channel affected by Rayleigh fading. We also include a study on the effects that high workloads have on a server.

  10. Effectiveness of the 'Home-but not Alone' mobile health application educational programme on parental outcomes: A randomized controlled trial, study protocol

    DEFF Research Database (Denmark)

    Shorey, Shefaly; Peng Mei, Yvonne; Danbjørg, Dorthe Boe;

    2016-01-01

    IM: To describe a study protocol that evaluates the effectiveness of the 'Home-but not Alone' educational programme delivered via a mobile health application in improving parenting outcomes. BACKGROUND: The postnatal period is a stressful period that poses numerous challenges for parents. To ensu...... delivered via an innovative mobile health application on parental outcomes. Results from this study will enhance parenting self-efficacy, social support and parenting satisfaction, which may then reduce parental risks of postnatal depression....... measures comprise of parenting self-efficacy, social support, parenting satisfaction and postnatal depression. Data will be collected at the baseline (on the day of discharge) and at four weeks postpartum. DISCUSSION: This will be an empirical study that evaluates a theory-based educational programme...... a smooth transition, it is important to support these parents during this demanding period. Meanwhile, the development in mobile-based technology gives us the opportunity to develop an accessible educational programme that can be potentially beneficial for new parents. However, there is a scarcity...

  11. CLINICAL EVALUATION OF FAILED ENDONASAL DCR OPERATIONS AND THEIR MANAGEMENT

    OpenAIRE

    Mohammed Naveed; Muneeruddin Ahmed; Mahendra Kumar; Ramakrishna; Siva Prasad; Boddikuri

    2014-01-01

    INTRODUCTION: Endoscopic Intra nasal approach to by-pass the obstruction of lacrimal apparatus is a simple and commonly practiced surgery among the ENT Surgeons. Various modifications in the form of usage of micro drill, application of Mitomycin C and preserving the nasal flap to line the opening in the sac to name a few are being used. Recurrence of epiphora and closure of the neo opening is described and observed are labeled as failed endonasal DCR. This study makes an a...

  12. Nursing Students' Opinion on the Use of Smartphone Applications (Apps) in Clinical Education and Training: A Study Protocol.

    Science.gov (United States)

    O'Connor, Siobhan; Andrews, Tom

    2016-01-01

    Nurse educators are exploring different mobile technologies to provide additional support to nursing students in clinical practice. However, the view of nursing students on the use of smartphone applications (apps) to enhance clinical education has not been explored. This proposed study will use a self-reported questionnaire to examine the opinions of nursing students on the current and potential use of smartphone apps when training in clinical settings. Descriptive and inferential statistics will be performed on the quantitative data. Qualitative data from open ended questions will be thematically analysed using the framework approach. This will be the first study to examine the use of smartphone apps as a support in clinical teaching from a students' perspective. Their opinion is vital if the right mobile technology is to be designed and implemented. PMID:27332464

  13. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  14. SCRUTINY OF BROADCASTING PROTOCOLS IN VANET

    OpenAIRE

    Rohini Nere; Uma Nagaraj

    2015-01-01

    Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protoc...

  15. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Armenia and the IAEA for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). It was approved by the Board of Governors on 23 September 1997, signed in Vienna on 29 September 1997, and it will enter into force on the date the Agency receives written notification that Armenia's statutory and/or constitutional requirements for entry into force have been met. Pending entry into force, this Protocol shall apply provisionally from the date of signature, i.e., 29 September 1997

  16. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele;

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  17. 多源交互式应用层组播路由协议%Multi-Source Interactive Application Layer Multicast Routing Protocol

    Institute of Scientific and Technical Information of China (English)

    高建敏; 陆慧梅; 曹元大

    2011-01-01

    Application layer multicast (ALM) without expanding the basic underlying network can support greater range of multicast communications, which makes it a popular mechanism for multicast applications.However, compared with the traditional IP multicast, ALM has larger network delay and the node stability is poor, which makes it become a unique and challenging problem to implement multi-source interactive multicast application.In this paper, an ALM protocol called Thunder is proposed.According to the roles of members in the group, Thunder divides the interactive group into core-network and peripheral-tree.The core-network consists of the multicast data sources.By using Mesh-Tree structure, it constructs an optimal distribution tree for each data source and pursues fast forwarding to optimize the interactive process.The peripherals-tree is a tree structure composed by the unstable members which just receive data or only produce a small amount of data.Additionally,Peripherals-tree structure allows more members to receive multicast data.Those unstable nodes will not influence the interaction process of core-network, so the response speed and the protocol scalability of the interactive process are improved.Experiments demonstrate that Thunder can decrease network delay of interactive ALM and improve the scalability, which makes the multi-source interactive multicast applications be deployed and implemented more easily.%应用层组播无需扩充底层基础网络就可以实现较大范围的组播通信,已成为倍受瞩目的组播实现机制.但相对于传统的IP组播,应用层组播的网络延迟大,节点稳定性差,使得采用应用层组播来实现多源交互式组播应用成为一个独特的具有挑战性的问题.Thunder协议将组播结构分为核心网和外围树两部分:核心网通过Mesh-Tree结构追求快速转发以优化交互式过程;外围树允许更多的成员接收组播数据,却不会对交互过程产生影响,可提高协议

  18. Contested Spaces of a "Failing" Elementary School

    Science.gov (United States)

    Kawai, Roi; Serriere, Stephanie; Mitra, Dana

    2014-01-01

    Amid the recent proliferation of teacher-led movements resisting high-stakes testing across the United States, the authors identify how a "failing" elementary school reclaimed local discourse by taking political action against top-down measures. Framed as competing modes of school reform, the authors offer the sociocultural framework of…

  19. Merger incentives and the failing firm defense

    NARCIS (Netherlands)

    Bouckaert, J.M.C.; Kort, P.M.

    2014-01-01

    The merger incentives between profitable firms differ fundamentally from the incentives of a profitable firm to merge with a failing firm. We investigate these incentives under different modes of price competition and Cournot behavior. Our main finding is that firms strictly prefer exit of the faili

  20. Failed Citizenship, Civic Engagement, and Education

    Science.gov (United States)

    Banks, James A.

    2015-01-01

    Many racial, ethnic, cultural, linguistic, and religious groups are denied structural inclusion into their nation-state. Consequently, they do not internalize the values and symbols of the nation-state, develop a strong identity with it, or acquire political efficacy. The author conceptualizes this process as "failed citizenship,"…

  1. Why Do Large Infrastructure Projects Often Fail?

    DEFF Research Database (Denmark)

    Lando, Henrik

    The paper reports, in a systematic manner, the views of a group of experienced practitioners on why large infrastructure projects often fail. The views, centering on the role played by the Owner (the Client or Buyer), can be summarized as follows:The owner should be aware of the need of clarity...... elements in securing successful projects....

  2. Understanding Failing Schools: Perspectives from the Inside

    Science.gov (United States)

    Nicolaidou, Maria; Ainscow, Mel

    2005-01-01

    This paper analyses the experience of so-called "failing schools" in order to develop understandings that can inform improvement efforts. It reports on a study of the experiences of a small number of English primary schools placed in "special measures" as a result of being inspected. The study is unusual in that, in the past, researchers have…

  3. A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    CERN Document Server

    Syamsuddin, Irfan; Chang, Elizabeth; Han, Song; 10.1109/ICCIT.2008.314

    2010-01-01

    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

  4. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  5. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all...

  7. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  8. Analysis of failed nuclear plant components

    Science.gov (United States)

    Diercks, D. R.

    1993-12-01

    Argonne National Laboratory has conducted analyses of failed components from nuclear power- gener-ating stations since 1974. The considerations involved in working with and analyzing radioactive compo-nents are reviewed here, and the decontamination of these components is discussed. Analyses of four failed components from nuclear plants are then described to illustrate the kinds of failures seen in serv-ice. The failures discussed are (1) intergranular stress- corrosion cracking of core spray injection piping in a boiling water reactor, (2) failure of canopy seal welds in adapter tube assemblies in the control rod drive head of a pressurized water reactor, (3) thermal fatigue of a recirculation pump shaft in a boiling water reactor, and (4) failure of pump seal wear rings by nickel leaching in a boiling water reactor.

  9. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  10. Cognitive emotion regulation fails the stress test

    OpenAIRE

    Raio, Candace M.; Orederu, Temidayo A.; Palazzolo, Laura; Shurick, Ashley A.; Phelps, Elizabeth A.

    2013-01-01

    Cognitive emotion regulation has been widely shown in the laboratory to be an effective way to alter the nature of emotional responses. Despite its success in experimental contexts, however, we often fail to use these strategies in everyday life where stress is pervasive. The successful execution of cognitive regulation relies on intact executive functioning and engagement of the prefrontal cortex, both of which are rapidly impaired by the deleterious effects of stress. Because it is specific...

  11. Rehabilitate Failing Park Sewage System Environmental Assessment

    OpenAIRE

    United States Department of the Interior, National Park Service

    2010-01-01

    The National Park Service (NPS) proposes to rehabilitate the failing sewage system within Bryce Canyon National Park, Utah. The rehabilitation would provide a safe, healthy, and functional environment, and maintain public health and future service for park visitors and staff. Portions of the sanitary sewage collection system were originally constructed in 1958 of clay pipe and currently service the lodge, staff housing, and visitor center before feeding into sewage treatment lagoons. Secti...

  12. Smoke and mirrors: the Kyoto Protocol and beyond

    OpenAIRE

    Kooten, van, G.C.

    2003-01-01

    The Kyoto Protocol is considered a necessary first step toward an effective future climate accord. As argued in this paper, however, the protocol will likely fail because it has too many loopholes, inadequate governance structures, and insufficient compliance provisions. This view is supported by case studies of Canada, Japan, and the Netherlands. These countries are unlikely to achieve their self-imposed targets, or, if they do, the costs of compliance will be unacceptably high. Consequently...

  13. The Kyoto protocol : Russian opportunities: OIES paper: RIIA Briefing Note

    OpenAIRE

    Müller, Benito

    2004-01-01

    Much, possibly too much, of the most recent debate on Russian ratification of the Kyoto Protocol has centred around the issue whether the Kyoto emission limit would hinder Russian economic growth, particularly in the context of the ambitious decadal Russian growth targets. The aim of this paper is to return the focus of the debate to the opportunities which the Kyoto Protocol could afford the Russian economy and which would be lost if Russia fails to grasp them by bringing the ...

  14. The obscure future of the Kyoto protocol

    OpenAIRE

    Tsayem Demaze, Moise

    2013-01-01

    Since it came into effect in 2005 followed by its first period of application from 2008 to 2012, the Kyoto protocol has been subject to debates and international negotiations about its post-2012 future. Many grey areas persist, even though the Durban conference, held in December 2011, and the Doha conference, held in December 2012, ratified the principle of a second period of application of the protocol and started negotiations for a new international treaty supposed to come into effect in 2020.

  15. Questions encountered in the application of emergency rescue protocol for safety production of building engineering and countermeasures%建筑工程安全应急预案应用中的问题及对策

    Institute of Scientific and Technical Information of China (English)

    张峻泉

    2009-01-01

    Based upon introduction of the matters deserving attention in the application of emergency rescue protocol for safety production of building engineering the questions encountered in the application of emergency rescue protocol for safety production of building engineering in our country at present are summarized, at the same time corresponding countermeasures are proposed in order to rescue in time and reduce loses and casualty after accident.%在阐述建筑工程安全生产应急救援预案过程中应注意事项的基础上,总结归纳了我国目前安全生产应急救援预案在实际应用中存在的问题,并针对性地提出应对措施,从而在事故发生后及时救援,减少损失,降低人员伤亡.

  16. EFFICIENT ALGORITHMS TO ENHANCE RECOVERY SCHEMA IN LINK STATE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Radwan S. Abujassar

    2011-08-01

    Full Text Available With the increasing demands for real-time applications traffic in net- works such as video and voice a highconvergence time for the existing routing protocols when failure occurred is required. These applicationscan be very sensitive to packet loss when link/node goes down. In this paper, we propose two algorithmsschemas for the link state protocol to reroute the traffic in two states; first, pre-calculated an alternativeand disjoint path with the primary one from the source to the destination by re-routing traffic through it,regardless of the locations of failure and the number of failed links. Second, rerouting the traffic via analternative path from a node whose local link is down without the need to wait until the source node knowsabout the failure. This is achieved by creating a new backup routing table based on the original routingtable which is computed by the dijkstra algorithm. The goal of these algorithms is to reduce loss of packets,end-to-end delay time, improve throughput and avoiding local loop when nodes re-converge the topologyin case of failure.

  17. Electrophysiology of Heart Failure Using a Rabbit Model: From the Failing Myocyte to Ventricular Fibrillation

    Science.gov (United States)

    Liu, Michael; Qu, Zhilin; Weiss, James N.; Ennis, Daniel B.; Klug, William S.; Garfinkel, Alan

    2016-01-01

    Heart failure is a leading cause of death, yet its underlying electrophysiological (EP) mechanisms are not well understood. In this study, we use a multiscale approach to analyze a model of heart failure and connect its results to features of the electrocardiogram (ECG). The heart failure model is derived by modifying a previously validated electrophysiology model for a healthy rabbit heart. Specifically, in accordance with the heart failure literature, we modified the cell EP by changing both membrane currents and calcium handling. At the tissue level, we modeled the increased gap junction lateralization and lower conduction velocity due to downregulation of Connexin 43. At the biventricular level, we reduced the apex-to-base and transmural gradients of action potential duration (APD). The failing cell model was first validated by reproducing the longer action potential, slower and lower calcium transient, and earlier alternans characteristic of heart failure EP. Subsequently, we compared the electrical wave propagation in one dimensional cables of healthy and failing cells. The validated cell model was then used to simulate the EP of heart failure in an anatomically accurate biventricular rabbit model. As pacing cycle length decreases, both the normal and failing heart develop T-wave alternans, but only the failing heart shows QRS alternans (although moderate) at rapid pacing. Moreover, T-wave alternans is significantly more pronounced in the failing heart. At rapid pacing, APD maps show areas of conduction block in the failing heart. Finally, accelerated pacing initiated wave reentry and breakup in the failing heart. Further, the onset of VF was not observed with an upregulation of SERCA, a potential drug therapy, using the same protocol. The changes introduced at the cell and tissue level have increased the failing heart’s susceptibility to dynamic instabilities and arrhythmias under rapid pacing. However, the observed increase in arrhythmogenic potential is

  18. The Application of Cytidyl Guanosyl Oligodeoxynucleotide Can Affect the Antitumor Immune Response Induced by a Combined Protocol of Cryoablation and Dendritic Cells in Lewis Lung Cancer Model.

    Science.gov (United States)

    Zhang, Mi; Yin, Tianquan; Lu, Yuan; Feng, Huasong

    2016-01-01

    BACKGROUND Recently, several combined therapeutic strategies and targeted agents have been under investigation for their potential role in lung cancer. The combined administration of dendritic cells (DCs) and immune-adjuvant cytidyl guanosyl oligodeoxynucleotide (CpG-ODN) after cryosurgery has proven to be an effective strategy for treating lung cancer. However, whether the application of CpG-ODN could affect the therapeutic results remained to be further explored. MATERIAL AND METHODS The Lewis lung cancer (LLC)-bearing mice received cryoablation and injection of ex vivo-cultured DCs into the peritumoral zone. Subsequently, CpG-ODN was administered to experimental animals 6 hours, 12 hours, and 24 hours after DC injection. The mice in the control group received coadministration of DCs and CpG-ODN simultaneously. Therapeutic effects were evaluated by survival rates. The resistance to rechallenge of LLC cell was assessed by lung metastasis and in vitro cytotoxicity of splenocytes. Furthermore, T-cell subsets and multiple cytokines (interleukin [IL]-4, -10, and-12; interferon [IFN]-γ; tumor necrosis factor [TNF]-α) in the blood were assessed to elucidate the underlying mechanisms. RESULTS Higher ratios of CD4+ and CD8+ T cells and higher levels of IL-12, IFN-γ, and TNF-α were found in the blood of the mice that received CpG-ODN therapy 12 h after DC injection. The cytotoxicity potency of the splenocytes of these mice was significantly higher compared with the mice in other groups. Moreover, the mice receiving CpG-ODN therapy 12 h after DC injection showed significantly better resistance to rechallenge. Compared with the mice in other groups, the mice receiving CpG-ODN therapy 12 h after DC injection were superior in survival rates and antimetastatic effects. CONCLUSIONS Our study suggested that the therapeutic efficacy was closely associated with CpG-ODN administration in the combined therapeutic protocol of cryoablation, DCs, and immune adjuvant. In situ

  19. A rapid and versatile combined DNA/RNA extraction protocol and its application to the analysis of a novel DNA marker set polymorphic between Arabidopsis thaliana ecotypes Col-0 and Landsberg erecta

    Directory of Open Access Journals (Sweden)

    Coupland George

    2005-08-01

    Full Text Available Abstract Background Many established PCR-based approaches in plant molecular biology rely on lengthy and expensive methods for isolation of nucleic acids. Although several rapid DNA isolation protocols are available, they have not been tested for simultaneous RNA isolation for RT-PCR applications. In addition, traditional map-based cloning technologies often use ill-proportioned marker regions even when working with the model plant Arabidopsis thaliana, where the availability of the full genome sequence can now be exploited for the creation of a high-density marker systems. Results We designed a high-density polymorphic marker set between two frequently used ecotypes. This new polymorphic marker set allows size separation of PCR products on agarose gels and provides an initial resolution of 10 cM in linkage mapping experiments, facilitated by a rapid plant nucleic acid extraction protocol using minimal amounts of A. thaliana tissue. Using this extraction protocol, we have also characterized segregating T-DNA insertion mutations. In addition, we have shown that our rapid nucleic acid extraction protocol can also be used for monitoring transcript levels by RT-PCR amplification. Finally we have demonstrated that our nucleic acid isolation method is also suitable for other plant species, such as tobacco and barley. Conclusion To facilitate high-throughput linkage mapping and other genomic applications, our nucleic acid isolation protocol yields sufficient quality of DNA and RNA templates for PCR and RT-PCR reactions, respectively. This new technique requires considerably less time compared to other purification methods, and in combination with a new polymorphic PCR marker set dramatically reduces the workload required for linkage mapping of mutations in A. thaliana utilizing crosses between Col-0 and Landsberg erecta (Ler ecotypes.

  20. Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 23 September 1997, signed in Vienna on 30 September 1997, and entered into force on 5 May 2000

  1. Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 4 April 2000

  2. Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 24 March 1999, signed in Vienna on 29 September 1999, and entered into force on 16 May 2000

  3. Protocol Additional the the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and entered into force on 6 July 2000

  4. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  5. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  6. Tendencies in the development of utilization protocols, seminar report

    Science.gov (United States)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  7. The effect of local cryotherapy on subjective and objective recovery characteristics following an exhaustive jump protocol.

    Science.gov (United States)

    Hohenauer, Erich; Clarys, Peter; Baeyens, Jean-Pierre; Clijsen, Ron

    2016-01-01

    The purpose of this controlled trial was to investigate the effects of a single local cryotherapy session on the recovery characteristics over a period of 72 hours. Twenty-two young and healthy female (n=17; mean age: 21.9±1.1 years) and male (n=5;mean age: 25.4±2.8 years) adults participated in this study. Following an exhaustive jump protocol (3×30 countermovement jumps), half of the participants received either a single local cryotherapy application (+8°C) or a single local thermoneutral application (+32°C) of 20-minute duration using two thigh cuffs. Subjective measures of recovery (delayed-onset muscle soreness and ratings of perceived exertion) and objective measures of recovery (vertical jump performance and peak power output) were assessed immediately following the postexercise applications (0 hours) and at 24 hours, 48 hours, and 72 hours after the jump protocol. Local cryotherapy failed to significantly affect any subjective recovery variable during the 72-hour recovery period (P>0.05). After 72 hours, the ratings of perceived exertion were significantly lower in the thermoneutral group compared to that in the cryotherapy group (P=0.002). No significant differences were observed between the cryotherapy and the thermoneutral groups with respect to any of the objective recovery variables. In this experimental study, a 20-minute cryotherapy cuff application failed to demonstrate a positive effect on any objective measures of recovery. The effects of local thermoneutral application on subjective recovery characteristics were superior when compared to the effects of local cryotherapy application at 72 hours postapplication. PMID:27579000

  8. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standa...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  9. Fuglede's conjecture fails in dimension 4

    OpenAIRE

    Matolcsi, Mate

    2006-01-01

    In this note we give an example of a set $\\W\\subset \\R^4$ such that $L^2(\\W)$ admits an orthonormal basis of exponentials $\\{\\frac{1}{|\\W |^{1/2}}e^{2\\pi i x, \\xi}\\}_{\\xi\\in\\L}$ for some set $\\L\\subset\\R^4$, but which does not tile $\\R^4$ by translations. This improves Tao's recent 5-dimensional example, and shows that one direction of Fuglede's conjecture fails already in dimension 4. Some common properties of translational tiles and spectral sets are also proved.

  10. The Failed Image and the Possessed

    DEFF Research Database (Denmark)

    Suhr, Christian

    2015-01-01

    This article asks if the recurrent queries regarding the value of images in visual anthropology could find new answers by exploring responses to visual media in neo-orthodox Islam. It proposes that the visual display of the photographic image shares a curious resemblance to the bodies of people...... possessed by invisible spirits called jinn. The image as a failed example or model of reality works like the possessed body as an amplifier of invisibility pointing towards that which cannot be seen, depicted visually, or represented in writing. This suggests a negative epistemology in which images obtain...

  11. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides...... a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  12. Block Advertisement Protocol

    OpenAIRE

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  13. Precise Energy Modeling for the Bluetooth Low Energy Protocol

    OpenAIRE

    Kindt, Philipp; Yunge, Daniel; Diemer, Robert; Chakraborty, Samarjit

    2014-01-01

    Bluetooth Low Energy (BLE) is a wireless protocol well suited for ultra-low-power sensors running on small batteries. BLE is described as a new protocol in the official Bluetooth 4.0 specification. To design energy-efficient devices, the protocol provides a number of parameters that need to be optimized within an energy, latency and throughput design space. To minimize power consumption, the protocol parameters have to be optimized for a given application. Therefore, an energy-model that can ...

  14. Research on Diameter Protocols%Diameter协议研究

    Institute of Scientific and Technical Information of China (English)

    邱锡鹏; 刘海鹏

    2003-01-01

    Diameter is the next authentication,authorization and accounting protocol currently developed in the IETF AAA working group ,which will replace the widely and successfully deployed Radius protocol. In the paper ,the motivations and backgrounds of Diameter protocols are firstly introduced. The following is a detailed description of the Diameter base protocol and its applications,such as mobile IP,NASREQ. Then the comparisons and analysis between Diameter and Radius are given.

  15. Removal of failed crown and bridge.

    Science.gov (United States)

    Sharma, Ashu; Rahul, G R; Poduval, Soorya T; Shetty, Karunakar

    2012-07-01

    Crown and bridge have life span of many years but they fail for a number of reasons. Over the years, many devices have been designed to remove crowns and bridges from abutment teeth. While the removal of temporary crowns and bridges is usually very straightforward, the removal of a definitive cast crown with unknown cement is more challenging. Removal is often by destructive means. There are a number of circumstances, however, in which conservative disassembly would aid the practitioner in completing restorative/endodontic procedures. There are different mechanisms available to remove a failed crown or bridge. But there is no information published about the classification of available systems for crown and bridge removal. So it is logical to classify these systems into different groups which can help a clinician in choosing a particular type of system depending upon the clinical situation. The aim of this article is to provide a classification for various crown and bridge removal systems; describe how a number of systems work; and when and why they might be used. A PubMed search of English literature was conducted up to January 2010 using the terms: Crown and bridge removal, Crown and bridge disassembly, Crown and bridge failure. Additionally, the bibliographies of 3 previous reviews, their cross references as well as articles published in various journals like International Endodontic Journal, Journal of Endodontics and were manually searched. Key words:Crown and bridge removal, Crown and bridge disassembly, Crown and bridge failure. PMID:24558549

  16. How to help a failing student

    Directory of Open Access Journals (Sweden)

    Malinić Dušica

    2007-01-01

    Full Text Available Different aspects of family and school life, as well as individual characteristics of the student are related to academic failure in various degrees. Once it has become evident that a student is failing in study and learning, and the causes of the failure have been identified, the question arises of how to help him/her to overcome the existing difficulties. Although there are some authors who hold that the intervention in the domain of failure is inconsistent an unconvincing for a number of reasons, in this paper we shall suggest some solutions and recommendations which have been empirically tested. The first part of the paper discusses the advantages and drawbacks of grouping students according to their abilities as one of the strategies of helping unsuccessful students. In the second part we offer some recommendations for work with unsuccessful students based on their preferred learning styles. The third part focuses on examining the effects of counseling on solving the problem of academic failure. Finally, some general suggestions are offered to students, teachers and parents which might prove useful in enhancing academic attainment of failing students.

  17. Model protocol additional to the agreement(s) between state(s) and the International Atomic Energy Agency for the application of safeguards

    International Nuclear Information System (INIS)

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguard system as a contribution to global nuclear non-proliferation objectives

  18. Application of RS485 Protocol in Horizontal Impregnating and Drying Production Line%基于RS485协议的通信技术在卧式浸渍干燥生产线中的应用

    Institute of Scientific and Technical Information of China (English)

    薛建利; 宋惠萌

    2014-01-01

    基于底层RS485协议的通信方式以其良好的性价比、极强的通用性在工业现场被广泛采用。本文主要介绍了通过RS485协议的汇川PLC、伺服控制系统在人造板二次加工卧式浸渍干燥生产线中的应用。%With attractive price/quality ratio and the high versatility, the underlying communication mode based on RS485 protocol is widely used in the fieldwork. This paper mainly described the application of the Inovance PLC and servo control system with RS485 protocol in the horizontal impregnating and drying production line.

  19. A Solution to ``Too Big to Fail''

    Science.gov (United States)

    Kohler, Susanna

    2016-10-01

    Its a tricky business to reconcile simulations of our galaxys formation with our current observations of the Milky Way and its satellites. In a recent study, scientists have addressed one discrepancy between simulations and observations: the so-called to big to fail problem.From Missing Satellites to Too Big to FailThe favored model of the universe is the lambda-cold-dark-matter (CDM) cosmological model. This model does a great job of correctly predicting the large-scale structure of the universe, but there are still a few problems with it on smaller scales.Hubble image of UGC 5497, a dwarf galaxy associated with Messier 81. In the missing satellite problem, simulations of galaxy formation predict that there should be more such satellite galaxies than we observe. [ESA/NASA]The first is the missing satellites problem: CDM cosmology predicts that galaxies like the Milky Way should have significantly more satellite galaxies than we observe. A proposed solution to this problem is the argument that there may exist many more satellites than weve observed, but these dwarf galaxies have had their stars stripped from them during tidal interactions which prevents us from being able to see them.This solution creates a new problem, though: the too big to fail problem. This problem states that many of the satellites predicted by CDM cosmology are simply so massive that theres no way they couldnt have visible stars. Another way of looking at it: the observed satellites of the Milky Way are not massive enough to be consistent with predictions from CDM.Artists illustration of a supernova, a type of stellar feedback that can modify the dark-matter distribution of a satellite galaxy. [NASA/CXC/M. Weiss]Density Profiles and Tidal StirringLed by Mihai Tomozeiu (University of Zurich), a team of scientists has published a study in which they propose a solution to the too big to fail problem. By running detailed cosmological zoom simulations of our galaxys formation, Tomozeiu and

  20. 椭圆曲线离散对数问题上的Fail-stop数字签名方案%Fail-stop digital signatures on elliptic curve discrete logarithm problem.

    Institute of Scientific and Technical Information of China (English)

    李云超; 辛小龙

    2011-01-01

    A new Fail-stop signature program based on elliptic curve discrete logarithm problem is proposed. It can protect the security of the signer. The new protocol presents a one-time signature scheme.A multiple messages signature scheme is given. Both the two schemes have the property of Fail-stop.%提出了一种基于椭圆曲线离散对数问题的Fail-stop签案,保证了签名者的安全性.提出了一次性签名方案,给出了多重消息签名方案,并且这两种方案都具有Fail-stop的性质.

  1. Transport Protocol Throughput Fairness

    Directory of Open Access Journals (Sweden)

    Saleem Bhatti

    2009-11-01

    Full Text Available Interest continues to grow in alternative transport protocols to the Transmission Control Protocol (TCP. These alternatives include protocols designed to give greater efficiency in high-speed, high-delay environments (so-called high-speed TCP variants, and protocols that provide congestion control without reliability. For the former category, along with the deployed base of ‘vanilla’ TCP – TCP NewReno – the TCP variants BIC and CUBIC are widely used within Linux: for the latter category, the Datagram Congestion Control Protocol (DCCP is currently on the IETF Standards Track. It is clear that future traffic patterns will consist of a mix of flows from these protocols (and others. So, it is important for users and network operators to be aware of the impact that these protocols may have on users. We show the measurement of fairness in throughput performance of DCCP Congestion Control ID 2 (CCID2 relative to TCP NewReno, and variants Binary Increase Congestion control (BIC, CUBIC and Compound, all in “out-of-the box” configurations. We use a testbed and endto- end measurements to assess overall throughput, and also to assess fairness – how well these protocols might respond to each other when operating over the same end-to-end network path. We find that, in our testbed, DCCP CCID2 shows good fairness with NewReno, while BIC, CUBIC and Compound show unfairness above round-trip times of 25ms.

  2. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  3. Pulsed Nd:YAG laser treatment for failing dental implants due to peri-implantitis

    Science.gov (United States)

    Nicholson, Dawn; Blodgett, Kris; Braga, Charles; Finkbeiner, Larry; Fourrier, Jeanne; George, John; Gregg, Robert; Honigman, Allen; Houser, Bruce; Lamas, William; Lehrman, Neal; Linden, Eric; McCarthy, Delwin; McCawley, Tom; McCormick, Randy; Marcus, Ed; Noraian, Kirk; Rubelman, Peter; Salama, Maurice; Saunders, Steven; Seamons, Brandon; Thein, David; Toms, Michael; Vassos, George; Harris, David M.

    2014-02-01

    A large percentage of dental implants experience complications, most commonly, infection leading to peri-implantitis and peri-mucositis, inflammatory disease involving pathogen contamination. It presents with radiographic findings of crestal bone loss. At this time there appears to be no compelling evidence for an effective intervention. The LANAP protocol is a FDA cleared surgical protocol that produces new attachment and bone regeneration when applied to periodontally infected natural teeth. The LANAP protocol and laser dosimetry have been modified to treat ailing and failing implants. Twenty-one clinicians who have been trained to perform the LANAP protocol and the LAPIPTM protocol have volunteered 26 LAPIP case reports. The time from implant to intervention ranges from 3 months to 16 years. Post-LAPIP radiographs range from 2-48 months. Ten cases were excluded for technical reasons. All 16 remaining cases provide radiographic evidence of increase in crestal bone mass around the implant and, when reported, probe depth reductions. All treating clinicians report control of the infection, reversal of bone loss and rescue of the incumbent implant. Although the success/failure rate cannot be judged from these data, any successes in this area deserve reporting and further study.

  4. Salvage arthrodesis for failed total ankle arthroplasty

    Science.gov (United States)

    Zürcher, Arthur W

    2010-01-01

    Background and purpose Total ankle arthroplasty (TAA) has gained popularity in recent years. If it fails, however, salvage arthrodesis must be reliable as a rescue procedure. We therefore investigated the clinical, radiographic, and subjective outcome after salvage arthrodesis in a consecutive group of patients, and concentrated on the influence of the method of fixation on union rate and on salvage in inflammatory joint disease. Patients and methods Between 1994 and 2005, salvage arthrodesis was performed on 18 ankles (18 patients). Diagnosis was inflammatory joint disease (IJD) in 15 cases and osteoarthritis (OA) in 3. Tibio-talar fusion was performed in 7 ankles, and tibio-talocalcaneal fusion in 11. Serial radiographs were studied for time to union. Clinical outcome at latest follow-up was measured by the AOFAS score, the foot function index (FFI) and by VAS scores for pain, function, and satisfaction. Results Blade plates were used in 7 ankles (4 IJD, 3 OA); all united. Nonunion developed in 7 of the 11 rheumatic ankles stabilized by other methods. 11 patients (8 fused ankles, 3 nonunions) were available for clinical evaluation. Their mean AOFAS score was 62 and mean overall FFI was 70. VAS score for pain was 20, for function 64, and for satisfaction 74. The scores were similar in united and non-united ankles. Interpretation Blade plate fixation is successful in salvage arthrodesis for failed TAA. A high nonunion rate was found after salvage ankle arthrodesis in IJD with other methods of fixation. Clinical results were fair to good. PMID:20175648

  5. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  6. MILITARY MULTI-HOP ROUTING PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Military tactical network is one of the most important applications of ad hoc network. Currently the existing routing protocols are put forward based on the simple and universal network model which has the ability of multi-hop routing but cannot work efficiently in the special military applications. The narrow bandwidth and limited energy of the wireless network make general routing protocols seem to be more redundant.In order to satisfy military needs properly, this letter makes a detailed analysis of physical nodes and traffic distribution in military network, uses cross-layer design concept for reference, combines traffic characteristic of application layer with routing protocol design. It categorized routing problem as crucial routes and non-crucial routes which adopted separate maintenance methods. It not only realizes basic transmission function but also works efficiently. It is quite fit for military application.

  7. Study on multi protocol label switching (MPLS) technology and its application%多协议标记交换技术的原理及应用

    Institute of Scientific and Technical Information of China (English)

    程建兴; 陈红斌; 赖友源; 黄宏波

    2005-01-01

    网络互联协议(Internet-protocol,IP)和异步传输模式(Asynchronous Transfer Mode,ATM)技术的结合,能充分发挥多协议标记交换(Multi Protocol Label Switching,MPLS)技术在流量管理方面的作用.MPLS在帧中继和ATM上运行,为面向连接的技术带来了IP的任意连通,适合在骨干网与广域网中使用.文章简述了MPLS的基本原理及其典型的网络体系结构,着重讨论了MPLS的应用.

  8. Android平台可增量同步的网络应用协议%Incremental Synchronizable Network Application Protocol on Android Platform

    Institute of Scientific and Technical Information of China (English)

    刘宇; 戴鸿君; 郭凤华; 赵国玲

    2011-01-01

    In order to solve data synchronization interruption caused by instability of mobile communication network, this paper uses Extensible Markup Language(XML) to design incremental synchronizable network protocol, and tags-bit to record incremental synchronization information. The protocol achieves the incremental synchronization process by coordinating of database and file system to improve the system performance and security. The incremental file transfer technology used in the protocol can improve the efficiency of data synchronization. The network protocol is applied to a dormitory management system on mobile phone with Android. Experimental results show that the system supports transmission interrupt and the reliability of the data synchronization is improved.%针对移动通信网络不稳定所造成的数据同步中断问题,使用可扩展标记语言设计一种可增量同步的网络应用协议,采用标记位方式记录同步执行情况,通过数据库、文件系统的相互配合实现增量同步,以提高系统性能及安全性,并利用增量文件传输技术提高数据同步效率.将该协议用于Android手机宿舍管理系统,结果表明,系统支持传输中断,数据同步的可靠性明显提高.

  9. We still fail to account for Mendel's observations

    Directory of Open Access Journals (Sweden)

    Porteous John W

    2004-08-01

    Full Text Available Abstract Background The present article corrects common textbook accounts of Mendel's experiments by re-establishing what he wrote and how he accounted for his observations. It notes the long-established tests for the validity of any explanations that purport to explain observations obtained by experiment. Application of these tests to Mendel's paper shows that the arguments he used to explain his observations were internally consistent but were, on one crucial issue, implausible. The same tests are applied to the currently accepted explanation for Mendel's observations. Conclusions The currently favoured explanation for Mendel's observations is untenable. It misrepresents Mendel, fails to distinguish between the parameters and the variables of any system of interacting components, its arguments are inconsistent, it repeats the implausibility in Mendel's paper, fails to give a rational explanation for his observed 3:1 trait ratio and cannot explain why this ratio is not always observed in experimental practice. A rational explanation for Mendel's observations is initiated. Readers are challenged to complete the process before a further article appears.

  10. Development Of Protocols For Simultaneous Measurements Of Rn, Tn Using Nuclear Track Detectors And Trial Application In Mining Areas Of Vietnam

    International Nuclear Information System (INIS)

    Radioactive gases Radon (Rn) and Thoron (Tn) contribute of more than 50% of natural radiation dose. However, separate measurements of Rn and Tn have not been paid enough attention. An Intergovernmental Cooperation Project was conducted at the Institute for Nuclear Science and Technology with the help from Hungarian experts. The main tasks of the project were to finalize 02 protocols for simultaneous measurements of Rn and Tn using nuclear track detectors and to test these protocols in investigating the concentrations of Rn and Tn, calculating the natural dose due to Rn and Tn, and evaluating the increased radiation dose and radiation safety due to mining activities. Main results of the project include 02 protocols for simultaneous measurements of Rn and Tn and the test results in the mining areas. Rn and Tn concentrations inside the coal mining tunnels are in the average level of Vietnam and the world. Tn concentration inside the factory for separating Zircon at the Ha Tinh Zircon Processing Plant was found to be very high, up to 2931 Bq/m3. Based on annual effective dose calculation, workers inside the factory for separating Zircon at the Ha Tinh Zircon Processing Plant could receive an annual effective dose due to Rn and Tn of 4.890 mSv/year, and the increasing dose of 4.710 mSv/year is for higher than 1 mSv/year recommended by the IAEA. (author)

  11. A Primary-Backup Protocol for In-Memory Database Replication

    OpenAIRE

    Camargos, Lásaro; Pedone, Fernando; Schmidt, Rodrigo

    2006-01-01

    The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control and deferred disk writes. Primary crashes are quickly detected by backups and a new primary is elected whenever the current one is suspected to have failed. False failure suspicions are tolerated and never lead to incorrect behavior. The protocol uses a consensus-like algorithm tailor-made for our replication enviro...

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  14. 30 CFR 77.312 - Fail safe monitoring systems.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Fail safe monitoring systems. 77.312 Section 77... Thermal Dryers § 77.312 Fail safe monitoring systems. Thermal dryer systems and controls shall be protected by a fail safe monitoring system which will safely shut down the system and any related...

  15. Protocol to suspend the application of safeguards pursuant to the Agreement of 26 February 1976 between the Agency, the Government of the Federative Republic of Brazil and the Government of the Federal Republic of Germany in the light of the provisions for the application of safeguards pursuant to the Quadripartite Safeguards Agreement between Argentina, Brazil, the Brazilian-Argentine Agency for the Accounting and Control of Nuclear Materials and the IAEA

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol of 16 October 1998 suspending the application of safeguards under the Safeguards Agreement (INFCIRC/237) of 26 February 1976 between the Agency, Brazil and the Federal Republic of Germany in the light of the provisions for the application of safeguards pursuant to the Quadripartite Safeguards Agreement between the Agency, Brazil, the Brazilian-Argentine Agency for the Accounting and Control of Nuclear Materials and the IAEA. The Protocol entered into force on 21 October 1999

  16. Cognitive emotion regulation fails the stress test.

    Science.gov (United States)

    Raio, Candace M; Orederu, Temidayo A; Palazzolo, Laura; Shurick, Ashley A; Phelps, Elizabeth A

    2013-09-10

    Cognitive emotion regulation has been widely shown in the laboratory to be an effective way to alter the nature of emotional responses. Despite its success in experimental contexts, however, we often fail to use these strategies in everyday life where stress is pervasive. The successful execution of cognitive regulation relies on intact executive functioning and engagement of the prefrontal cortex, both of which are rapidly impaired by the deleterious effects of stress. Because it is specifically under stressful conditions that we may benefit most from such deliberate forms of emotion regulation, we tested the efficacy of cognitive regulation after stress exposure. Participants first underwent fear-conditioning, where they learned that one stimulus (CS+) predicted an aversive outcome but another predicted a neutral outcome (CS-). Cognitive regulation training directly followed where participants were taught to regulate fear responses to the aversive stimulus. The next day, participants underwent an acute stress induction or a control task before repeating the fear-conditioning task using these newly acquired regulation skills. Skin conductance served as an index of fear arousal, and salivary α-amylase and cortisol concentrations were assayed as neuroendocrine markers of stress response. Although groups showed no differences in fear arousal during initial fear learning, nonstressed participants demonstrated robust fear reduction following regulation training, whereas stressed participants showed no such reduction. Our results suggest that stress markedly impairs the cognitive regulation of emotion and highlights critical limitations of this technique to control affective responses under stress.

  17. The British Model in Britain: Failing slowly

    International Nuclear Information System (INIS)

    In 1990, Britain reorganised its electricity industry to run on competitive lines. The British reforms are widely regarded as successful and the model used provides the basis for reforms of electricity industries worldwide. The main reason for this perception of success is major reductions in the real price of electricity with no reduction in service quality. This paper examines whether the reputation of the British reforms is justified. It concludes that the reputation is not justified and that serious fundamental problems are beginning to emerge. The central question is: have the British reforms resulted in the creation of efficient wholesale and retail markets? On this criterion, the reforms have failed. The wholesale market is dominated by obscure long-term contracts, privileged access to the market and self-dealing within integrated generator/retailers, leaving the spot markets with minimal liquidity and unreliable prices. The failure to develop an efficient wholesale market places the onus on consumers to impose competitive forces on electricity companies by switching regularly. Small consumers will not do this and they are paying too much for their power. For the future, there is a serious risk that the electricity industry will become a weakly regulated oligopoly with a veneer of competition

  18. Capital disadvantage: America's failing capital investment system.

    Science.gov (United States)

    Porter, M E

    1992-01-01

    The U.S. system of allocating investment capital is failing, putting American companies at a serious disadvantage and threatening the long-term growth of the nation's economy. The problem, says Michael Porter, goes beyond the usual formulation of the issue: accusations of "short-termism" by U.S. managers, ineffective corporate governance by directors, or a high cost of capital. The problem involves the external capital allocation system by which capital is provided to companies, as well as the system by which companies allocate capital internally. America's system is marked by fluid capital and a financial focus. Other countries--notably Japan and Germany--have systems with dedicated capital and a focus on corporate position. In global competition, where investment increasingly determines a company's capacity to upgrade and innovate, the U.S. system does not measure up. These conclusions come out of a two-year research project sponsored by the Harvard Business School and the Council on Competitiveness. Porter recommends five far-reaching reforms to make the U.S. system superior to Japan's and Germany's: 1. Improve the present macroeconomic environment. 2. Expand true ownership throughout the system so that directors, managers, employees, and even customers and suppliers hold positions as owners. 3. Align the goals of capital providers, corporations, directors, managers, employees, customers, suppliers, and society. 4. Improve the information used in decision making. 5. Foster more productive modes of interaction and influence among capital providers, corporations, and business units. PMID:10121317

  19. The Born rule fails in cosmology

    International Nuclear Information System (INIS)

    The Born rule may be stated mathematically as the rule that probabilities in quantum theory are expectation values of a complete orthogonal set of projection operators. This rule works for single laboratory settings in which the observer can distinguish all the different possible outcomes corresponding to the projection operators. However, theories of inflation suggest that the universe may be so large that any laboratory, no matter how precisely it is defined by its internal state, may exist in a large number of very distantly separated copies throughout the vast universe. In this case, no observer within the universe can distinguish all possible outcomes for all copies of the laboratory. Then normalized probabilities for the local outcomes that can be locally distinguished cannot be given by the expectation values of any projection operators. Thus the Born rule fails and must be replaced by another rule for observational probabilities in cosmology. The freedom of what this new rule is to be is the measure problem in cosmology. A particular volume-averaged form is proposed

  20. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  1. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    OpenAIRE

    Mödersheim, Sebastian Alexander; Viganò, Luca

    2014-01-01

    Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protoco...

  2. A Performance Comparison of Two Real Time WLAN MAC Protocols

    Institute of Scientific and Technical Information of China (English)

    CAO Chun-sheng; LI Feng; ZHANG Wei-dong

    2007-01-01

    By modifying the IEEE 802.11 wireless local area network (WLAN) medium access protocol (MAC), a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications. Both protocols can ensure the real time frame only need to wait a determinable bounded time. These two protocols are introduced briefly and a performance comparison between them is made. Simulation results show that each protocol has advantage over the others in certain network condition.

  3. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  4. Experience of the application of the 'Spanish Protocol' for the radiological surveillance and control of scrap and the metallic products resulting from its processing

    International Nuclear Information System (INIS)

    Despite the fact that the use of radiation technologies has been subject to strict controls in most countries since the very beginning, the presence of radioactive materials in scrap has been detected relatively often in recent years. This has led to the implementation of a series of national and international initiatives aimed at detecting and preventing such events, regardless of whether they are intentional or unintentional. The Spanish iron and steel industry is one of the most important industrial sectors in the country, and depends to a large extent on the importing of a significant proportion of the scrap used as raw material. Experience has shown that countries that import large quantities of scrap should complement the aforementioned international initiatives with others of national scope, in order to reduce the risks arising from the presence of radioactive material in such material. In this context, in 1999 the Spanish authorities, along with the business associations involved in the metal recovery and smelting industry and the radioactive waste management agency, voluntarily signed a 'Protocol' defining and implementing a national system for the radiological surveillance and control of scrap and products resulting from its processing. Since then the most relevant Trade Unions and others in the industrial sector have also signed the 'Protocol'. The system defines the rights and obligations of the Parties and describes the surveillance and control system to be established, which consists of a set of legal bases, the operation of specific radiological surveillance equipment - either new and specific or general purpose equipment already in existence prior to these initiatives - the development of radiological training and information plans for the professionals involved in the metal recovery and smelting sectors, the definition of a fully operational system to safely manage the materials detected and general improvement of the national radiological

  5. Application of Modbus protocol in the detection system of broken pipes%Modbus协议在破管检测系统中的应用

    Institute of Scientific and Technical Information of China (English)

    陈俊; 王勇

    2014-01-01

    The broken pipe detection system adopts a PIC24F microcontroller(PIC24FJ64GA006) of the Microchip Technology Inc. as the main controller chip. In order to realize communication between the system and the Personal Computer, Modbus communication protocol is used on the basis of RS485 serial port. The implementation and design process of the Modbus communication protocol in the broken pipe detection system are analyzed, and the main flow chart of the software is given. The reading and writing register procedure of Modbus RTU(Remote Terminal Unit) communication protocol is explained, and the Modbus RTU protocol is simplified according to the actual situation so as to effectively improve data transmission and the efficiency of the code. The experimental result shows that the scheme can improve the stability and safety in the process of data transfer.%本破管检测系统采用美国微芯科技公司的 PIC24F单片机(PIC24FJ64GA006)为主控制器芯片。为了实现 PIC24F 和上位机的通信,在 RS485串行通信总线接口基础上,应用了 Modbus通信协议。文中分析了 Modbus协议在破管检测系统中的实现和设计过程,给出了软件的主要功能流程图,阐述了 Modbus RTU(远程终端单元)通信协议读写寄存器过程,并结合实际对 Modbus RTU协议进行相应的裁剪,以有效实现有效数据传输,提高代码运行的效率。实验验证:本协议的实现方案能提高数据传输的稳定性和安全性,已成功运用到破管检测系统中。

  6. The role of central, regional and local administrations in the application of the Kyoto protocol in the forestry sector in Italy

    Directory of Open Access Journals (Sweden)

    Pompei E

    2007-01-01

    Full Text Available According to art. 3.3 and 3.4 of the Kyoto Protocol and subsequent UNFCCC COP's and national decisions, Italy shall report the net changes in GHG emissions by sources and removals by sinks resulting from afforestation, reforestation and deforestation (art. 3.3 and forest management (art. 3.4 activities. To assess art. 3.3 activities, Italy will define methods to estimate land use changes occurring after 31 December 1989. The paper considers the key-role that central administration shall have, as well as the role of regional and local administrations in order to solve some specific topics regarding data collection and management issues.

  7. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  8. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  9. Analysing the fate of nanopesticides in soil and the applicability of regulatory protocols using a polymer-based nanoformulation of atrazine.

    Science.gov (United States)

    Kah, Melanie; Machinski, Patrick; Koerner, Petra; Tiede, Karen; Grillo, Renato; Fraceto, Leonardo Fernandes; Hofmann, Thilo

    2014-10-01

    For the first time, regulatory protocols defined in the OECD guidelines were applied to determine the fate properties of a nanopesticide in two agricultural soils with contrasting characteristics. The nanoformulation studied had no effect on the degradation kinetics of atrazine indicating that (1) the release of atrazine from the polymer nanocarriers occurred rapidly relative to the degradation kinetics (half-lives 36-53 days) and/or that (2) atrazine associated with the nanocarriers was subject to biotic or abiotic degradation. Sorption coefficients, derived from a batch and a centrifugation technique at a realistic soil-to-solution ratio, were higher for the nanoformulated atrazine than for the pure active ingredient. Results indicate that the nanoformulation had an effect on the fate of atrazine. However, since the protocols applied were designed to assess solutes, conclusions about the transport of atrazine loaded onto the nanocarriers should be made extremely cautiously. The centrifugation method applied over time (here over 7 days) appears to be a useful tool to indirectly assess the durability of nanopesticides under realistic soil-to-solution ratios and estimate the period of time during which an influence on the fate of the active ingredient may be expected. More detailed investigations into the bioavailability and durability of nanopesticides are necessary and will require the development of novel methods suitable to address both the "nano" and "organic" characteristics of polymer-based nanopesticides.

  10. A methodology for analysing temporal changes of forest surface using aerial photos for the application of Kyoto protocol: a study case in Northern Italy

    Directory of Open Access Journals (Sweden)

    Salvadori I

    2006-01-01

    Full Text Available According to art. 3.3 of the Kyoto Protocol, Italy, like other Parties included in Annex I, shall report the net changes in greenhouse gas emissions by sources and removals by sinks resulting from afforestation, reforestation and deforestation activities (ARD. To evaluate these activities, Italy has to elaborate methods to estimate the conversion of non-forested to forested land, occurred after 31 December 1989. The aim of this study was to test a methodology to estimate the ARD activities. The approach was experimented in the Comunità Montana del Grappa (about 10500 ha considered as a pilot area in the Prealpine region (NE Italy. The land-use change relative to the forest area was assessed by multitemporal classification of 1131 sampling points on orthocorrected aerial photos relative to 1991, 1996 and 1999. The forest area based on different definitions (minimum land cover equal to 10%, 20% or 30% and minimum surface equal to 2000 m2 or 5000 m2 was also assessed. Between 1991 and 1999, the total increment of the forest area was equal to 224 ha. However, the estimated increment was strongly related to the minimum surface (2000 m2 vs 5000 m2 of the forest definition. The proposed procedure was relatively easy to implement and highlighted the role of ARD and revegetation to attain the goals appointed from the Kyoto Protocol.

  11. 基于SNAP的协商过程支持协议设计与实现%SNAP based Negotiation Support Protocol Design and Application

    Institute of Scientific and Technical Information of China (English)

    蚁龙; 刘连臣; 倪晚成

    2008-01-01

    资源共享是解决资源短缺、提高整体生产力的有效方法.基于服务水平合同(Service Level Agreement,SLA)的资源买卖属于以市场经济为基础的资源共享环境.由于目前基于SLA的网上买卖协议(Protocol)没有SLA交易条件协商过程支持.所以系统无法有效地对交易过程提供协商功能.SNAP(Service Negotiation and Acquisition Protocol)是基于SLA的信息协议方案,本文对原来SNAP方案基础上增加交易条件协商过程的描写,并提供具体系统建设使用的方法,最后以"全国贵重与优质教育资源共享"项目为背景进行了的使用验证.

  12. Research of Application Layer Protocol in Electric Vehicle Based on CAN Bus%应用于电动汽车的CAN网络应用层协议研究

    Institute of Scientific and Technical Information of China (English)

    袁传义; 吴志新; 刘成晔; 黄学勤

    2012-01-01

    介绍了CAN技术规范和OSI参考模型;从通信内容的确定、标识符分配、消息编码方式、消息调度策略、数据格式定义5个方面考虑,制定了一套适用于电动汽车的CAN网络应用层协议.实际应用表明,采用该协议的CAN总线通信系统有很高的可靠性,通信负载率不超过30%,保证了紧急报文的及时发现和处理.%The CAN technical specifications and OS1 reference model were introduced, and an application layer protocol of CAN network was established for electric vehicle considering five aspects including determination of communication contents, identifier assignment, message encoding, message scheduling strategies and data format define. Practical application result showed that CAN bus communication system adopting the protocol has high reliability and the communication load rate is less than 30%, which ensures timely detection and treatment of emergency messages.

  13. A Secure Protocol for Efficient SMS Transmission and Management

    Directory of Open Access Journals (Sweden)

    Lianju Ning

    2013-09-01

    Full Text Available Recently, the usage of mobile phones around the world is growing more and more. Short Message Service (SMS is one of the most important applications due to its easy way to send and receive messages from users to users. There have been many transmission protocols aiming to make sure secure and effective transferring in the SMS. Some of them are based on symmetric algorithms, while others are based on signature encryption or public key infrastructure. However, all of these existing protocols lack sufficient security or high efficiency. When the protocols possess high security margin, they usually have a limited performance in software. And when the performance is guaranteed, the security margin usually decreases. So in this paper, we study the advantages and disadvantages of some widely-used protocols. Basing on this, we propose a new protocol for secure SMS transmission. Our protocol improves both the structure and the modules of previous protocols from theoretical and practical aspects, so that it can assure the security level as well as very efficient performance. Compared with other protocols having similar security, our protocol has a more convenient implementation. Compared with other protocols with similar performance, our protocol is safer. Also, we use a signature model which does not need the PKI on-line, increasing the security greatly. Finally, we take experiments on real mobile phones to verify our protocol and analyze the results.

  14. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Directory of Open Access Journals (Sweden)

    Md. Golam Rashed

    2014-06-01

    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  15. Sediments fail to record geomagnetic transitions

    Science.gov (United States)

    Valet, Jean-Pierre; Meynadier, Laure; Bassinot, Franck; Simon, Quentin; Thouveny, Nicolas

    2016-04-01

    We have studied four records of the last Matuyama-Brunhes reversal from sediment cores from the equatorial Indian Ocean, west equatorial Pacific Ocean and North Atlantic Ocean with deposition rates of 4cm/ka and 2cm/ka for one equatorial core. All measurements were performed using 8cc cubic samples. In three records the demagnetization diagrams of the transitional samples are of bad quality. In the best samples the characteristic component of magnetization is defined with a large error that is reflected by an increase of the MAD value by at least a factor 10 with respect to non-transitional samples. Although not being frequently reported in papers which tend to exhibit the best demagnetization diagrams, this behavior is actually typical of most transitions studied in sedimentary sequences and somehow questions the reliability of the records. It is frequently considered that failure to isolate the initial magnetization component is due to weakly magnetized transitional samples with magnetization about ten times lower than outside the reversal. However, the magnetization intensity of transitional samples is much stronger in two of the present cores than the non-transitional samples of the other cores. The VGP paths that were tentatively derived from these transitions are quite complex and very different from each other. After rescaling all results to the same resolution the length of the transitional intervals remains different between each core suggesting that different magnetization processes were at work and yielded different records of the rapid field changes during the transition. Because similar magnetic grains recorded different directions, demagnetization fails to isolate a characteristic component. The sediment from west equatorial Pacific is an interesting exception with nice univectorial transitional diagrams decreasing towards the origin. The inclination remains close to zero, while the declination rotates smoothly between the two polarities. As a

  16. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  17. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  18. Variation of forest surface and carbon fixation in mountain areas of the Regione Veneto (Italy and the application of the Kyoto protocol

    Directory of Open Access Journals (Sweden)

    Anfodillo T

    2007-01-01

    Full Text Available The Parties that have signed the Kyoto Protocol must reduce global emissions of Greenhouse Gasses (GHG during the First Commitment Period (2008 - 2012 by at least 5% with respect to 1990. This share is 6.5% for Italy. The Kyoto Protocol lays down some measures for reducing GHG emissions, which include actions in agriculture and forestry. it will thus be possible to take emissions and absorptions resulting from land use changes into account in the National Balances. Given the widespread forests in Italy, it is very important to have an assessment of the aptitude of this sector to act as a carbon sink. In this study we analysed the variation of forestland cover in a mountain area of the Veneto Region (NE Italy. The analysis was done by comparing aerial photos taken in 1991 with orthophotos reported to 2003, by photointerpretation of points with casual distribution on sample areas, according to a stratified sampling. We estimated a statistically relevant increment of about 0.095% of forest land only up to 1500 m compared to the estimated forest cover for 1990 (about 42 ha, underlining how this low increase is mainly due to forest management. The second step was to estimate the fixed carbon in the areas where forests increased. This was achieved by collecting biometrical data in the field, and then using allometric functions. The annual carbon sink was estimated as 0.69 Mg ha-1 year-1. Comparing these results with previous studies done in the pre-alpine region we estimate the annual increment of the forest area in the whole Veneto region to be about 409.94 ha and that the total carbon sink is about 282.86 Mg C year-1. A method for estimating carbon sink in afforestation/reforestation areas is proposed that could also be applied to other sites in Italy.

  19. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002

  20. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed in Vienna on 20 September 2007

  1. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  2. Interior's Climate Science Centers: Focus or Fail

    Science.gov (United States)

    Udall, B.

    2012-12-01

    After a whirlwind two years of impressive and critical infrastructure building, the Department of Interior's Climate Science Centers are now in a position to either succeed or fail. The CSCs have a number of difficult structural problems including too many constituencies relative to the available resources, an uneasy relationship among many of the constituencies including the DOI agencies themselves, a need to do science in a new, difficult and non-traditional way, and a short timeframe to produce useful products. The CSCs have built a broad and impressive network of scientists and stakeholders. These entities include science providers of the universities and the USGS, and decision makers from the states, tribes, DOI land managers and other federal agencies and NGOs. Rather than try to support all of these constituencies the CSCs would be better served by refocusing on a core mission of supporting DOI climate related decision making. The CSCs were designed to service the climate science needs of DOI agencies, many of which lost their scientific capabilities in the 1990s due to a well-intentioned but ultimately harmful re-organization at DOI involving the now defunct National Biological Survey. Many of these agencies would like to have their own scientists, have an uneasy relationship with the nominal DOI science provider, the USGS, and don't communicate effectively among themselves. The CSCs must not succumb to pursuing science in either the traditional mode of the USGS or in the traditional mode of the universities, or worse, both of them. These scientific partners will need to be flexible, learn how to collaborate and should expect to see fewer resources. Useful CSC processes and outputs should start with the recommendations of the 2009 NRC Report Informing Decisions in a Changing Climate: (1) begin with users' needs; (2) give priority to process over products; (3) link information producers and users; (4) build connections across disciplines and organizations

  3. Wastewater GHG Accounting Protocols as Compared to the State of GHG Science.

    Science.gov (United States)

    Willis, John L; Yuan, Zhiguo; Murthy, Sudhir

    2016-08-01

    Greenhouse gas (GHG) accounting protocols have addressed emissions from wastewater conveyance and treatment using a variety of simplifying methodologies. While these methodologies vary to some degree by protocol, within each protocol they provide consistent tools for organizational entities of varying size and scope to report and verify GHG emissions. Much of the science supporting these methodologies is either limited or the protocols have failed to keep abreast of developing GHG research. This state-of-the-art review summarizes the sources of direct GHG emissions (both those covered and not covered in current protocols) from wastewater handling; provides a review of the wastewater-related methodologies in a select group of popular protocols; and discusses where research has out-paced protocol methodologies and other areas where the supporting science is relatively weak and warrants further exploration.

  4. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  5. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  6. PERFORMANCE ANALYSIS OF TRANSPORT PROTOCOL DURING LIVE MIGRATION OF VIRTUAL MACHINES

    Directory of Open Access Journals (Sweden)

    Prakash H R

    2011-10-01

    Full Text Available The Physical servers used in IT are under-utilized. The better utilization of these servers can be achieved using virtualization technology. Virtualization techniques create multiple partitions whichare isolated with each other called virtual machines. Each virtual machine (guest runs their own operating system. The resource allocated for these VMs may fail to execute an application because ofresource conflict or un availability of resources. This motivates towards live migration of virtual machines. The live migration copies the running VM from source host to destination host seamlesslyusing TCP as transport protocol.This paper evaluates performance of TCP in live migration of KVM based virtual machines. The flexibility in UDP which drives the concentration can also be used for thismigration.

  7. Feasibility study of a fail-safe through bulkhead initiator

    International Nuclear Information System (INIS)

    The design status of a through bulkhead initiator (TBI) is presented. The TBI design consists of a high explosive donor which when detonated transmits a shock wave through a metal bulkhead to initiate an acceptor explosive without destroying the integrity of the bulkhead. There are at least two potential applications for such a device. The combined requirements of the two applications are severe in several aspects, namely: fail-safe, small size, and controlled function time. The PETN donor output was characterized by velocity interferometer techniques. Two methods of controlling the output were demonstrated: (1) controlling the density of the donor and (2) controlling the length of the donor column (in relationship to the bulkhead thickness). The Type 304L stainless steel bulkhead was designed using a combination of experimental and analytical techniques to assure both function and integrity. The Type 304L provides a single shock rather than a multiple wave structure and exhibits high ductility. The PETN selected for the acceptor was chosen on the basis of shock sensitivity testing in which the morphology of the explosive and the wave shape of the stimulus entering the explosive played key roles. When tested with a short pulse (40 ns, rectangular), the small particle size PETN initiated at a lower pressure than did the large particle size PETN; when tested with a long pulse (280 ns, triangular), the large particle size PETN initiated at a lower pressure than did the small particle size PETN

  8. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France; Protocole additionnel entre la France, Euratom et l'AIEA. Session ordinaire de 2001-2002. Projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or {sup 233}U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  9. Rescue of failed filtering blebs with ab interno trephination.

    Science.gov (United States)

    Shihadeh, Wisam A; Ritch, Robert; Liebmann, Jeffrey M

    2006-06-01

    We evaluated the effectiveness of ab interno automated trephination as a technique for rescuing failed mature filtering blebs. A retrospective chart review of 40 failed blebs of 38 patients who had a posttrephination follow-up period of at least 3 months was done. With success defined as intraocular pressure (IOP) control with other modalities of management. Complications were few. We believe that ab interno trephination is an excellent option for rescuing selected failed filtering blebs.

  10. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  11. Study and Improvement of WTLS Protocol in WAP

    Institute of Scientific and Technical Information of China (English)

    CHEN Kai; LIU Ying; XIAO Guozhen

    2001-01-01

    Wireless application protocol (WAP)is a set of protocol designed for mobile terminal toconnect to Internet and is likely to become world stan-dard. Wireless transport layer security (WTLS) incor-porates the security features in WAP. In this paper,the analysis of the performance of WTLS is made.Two improvement schemes on WTLS are given: oneis that the client stores the certificate of servers; theother is that a new WTLS protocol is proposed basedon the designed authentication scheme.

  12. A Comparative Study of Various Routing Protocols in VANET

    OpenAIRE

    Kumar, Rakesh; Dave, Mayank

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. F inally the paper conclud...

  13. A Comparative Study of Various Routing Protocols in VANET

    OpenAIRE

    Rakesh Kumar; Mayank Dave

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. Finally the paper conclude...

  14. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    Directory of Open Access Journals (Sweden)

    Campagne Fabien

    2008-02-01

    Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT

  15. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  16. Applications and methods utilizing the Simple Semantic Web Architecture and Protocol (SSWAP for bioinformatics resource discovery and disparate data and service integration

    Directory of Open Access Journals (Sweden)

    Nelson Rex T

    2010-06-01

    Full Text Available Abstract Background Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of data between information resources difficult and labor intensive. A recently described semantic web protocol, the Simple Semantic Web Architecture and Protocol (SSWAP; pronounced "swap" offers the ability to describe data and services in a semantically meaningful way. We report how three major information resources (Gramene, SoyBase and the Legume Information System [LIS] used SSWAP to semantically describe selected data and web services. Methods We selected high-priority Quantitative Trait Locus (QTL, genomic mapping, trait, phenotypic, and sequence data and associated services such as BLAST for publication, data retrieval, and service invocation via semantic web services. Data and services were mapped to concepts and categories as implemented in legacy and de novo community ontologies. We used SSWAP to express these offerings in OWL Web Ontology Language (OWL, Resource Description Framework (RDF and eXtensible Markup Language (XML documents, which are appropriate for their semantic discovery and retrieval. We implemented SSWAP services to respond to web queries and return data. These services are registered with the SSWAP Discovery Server and are available for semantic discovery at http://sswap.info. Results A total of ten services delivering QTL information from Gramene were created. From SoyBase, we created six services delivering information about soybean QTLs, and seven services delivering genetic locus information. For LIS we constructed three services, two of which allow the retrieval of DNA and RNA FASTA sequences with the third service providing nucleic acid sequence comparison capability (BLAST. Conclusions The need for semantic integration technologies has preceded

  17. Applications and methods utilizing the Simple Semantic Web Architecture and Protocol (SSWAP) for bioinformatics resource discovery and disparate data and service integration

    Science.gov (United States)

    2010-01-01

    Background Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of data between information resources difficult and labor intensive. A recently described semantic web protocol, the Simple Semantic Web Architecture and Protocol (SSWAP; pronounced "swap") offers the ability to describe data and services in a semantically meaningful way. We report how three major information resources (Gramene, SoyBase and the Legume Information System [LIS]) used SSWAP to semantically describe selected data and web services. Methods We selected high-priority Quantitative Trait Locus (QTL), genomic mapping, trait, phenotypic, and sequence data and associated services such as BLAST for publication, data retrieval, and service invocation via semantic web services. Data and services were mapped to concepts and categories as implemented in legacy and de novo community ontologies. We used SSWAP to express these offerings in OWL Web Ontology Language (OWL), Resource Description Framework (RDF) and eXtensible Markup Language (XML) documents, which are appropriate for their semantic discovery and retrieval. We implemented SSWAP services to respond to web queries and return data. These services are registered with the SSWAP Discovery Server and are available for semantic discovery at http://sswap.info. Results A total of ten services delivering QTL information from Gramene were created. From SoyBase, we created six services delivering information about soybean QTLs, and seven services delivering genetic locus information. For LIS we constructed three services, two of which allow the retrieval of DNA and RNA FASTA sequences with the third service providing nucleic acid sequence comparison capability (BLAST). Conclusions The need for semantic integration technologies has preceded available solutions. We

  18. Model Additional Protocol

    International Nuclear Information System (INIS)

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  19. Innovative Drugs to Treat Depression: Did Animal Models Fail to Be Predictive or Did Clinical Trials Fail to Detect Effects?

    OpenAIRE

    Belzung, Catherine

    2014-01-01

    Over recent decades, encouraging preclinical evidence using rodent models pointed to innovative pharmacological targets to treat major depressive disorder. However, subsequent clinical trials have failed to show convincing results. Two explanations for these rather disappointing results can be put forward, either animal models of psychiatric disorders have failed to predict the clinical effectiveness of treatments or clinical trials have failed to detect the effects of these new drugs. A care...

  20. Introduction to CCSDS AOS Protocols and Its Applications%CCSDS高级在轨系统协议及其应用介绍

    Institute of Scientific and Technical Information of China (English)

    白云飞; 陈晓敏; 安军社; 熊蔚明; 孙辉先

    2011-01-01

    首先简要回顾了CCSDS(空间数据系统咨询委员会)AOS(高级在轨系统)建议及其在空间数据系统信息交换和处理方面的优势,然后介绍了继载人航天飞船有效载荷数据管理系统、“实践”五号卫星及双星探测计划之后,中国科学院空间科学与应用研究中心在“嫦娥”卫星、月球车综合电子演示系统、百兆级高速多路复接器及“萤火”一号探测器上开展CCSDS AOS应用研究的新进展.%Following a review of the AOS (Advanced Orbiting System) protocols of CCSDS (Consultative Committee for Space Data Systems) and its advantages in space data links, this paper introduces the progress made by CSSAR in research on and development of the Payload Data Management System of Chang'E satellites, lunar rover avionics demonstration system, Mb/s-level high rate multiplexer and YH-1 satellite following research on and development of the Payload Data Management Systems for China's Shenzhou-series manned spaceships, SJ-5 satellite and Double-Star Program satellites.

  1. Erika's Stories: Literacy Solutions for a Failing Middle School Student

    Science.gov (United States)

    Ma'ayan, Hadar Dubowsky

    2010-01-01

    Erika was a failing student at a large urban public middle school. She was poor, Hispanic, bilingual, and had repeated fourth grade. She scored low on her standardized tests and was failing several subject areas. In class, Erika was a student who sat silently with her head on her desk, and rarely turned in any of her assignments. She was a…

  2. Transport Layer Protocols Taxonomy From Voice Over Ip Perspective

    Directory of Open Access Journals (Sweden)

    Mosleh M. Abu-Alhaj

    2011-08-01

    Full Text Available VoIP technology is becoming increasingly important as they gain market share in PSTN technology. In the short run, it is likely that VoIP technology will dominate the telecommunications market. This evolution towards VoIP technology makes sense for improving the VoIP technology efficiency under the auspices of the internet. However, the PSTN still provide voice quality better than the VoIP technology voice quality. This would be due to many contributing factors such as delay and packet loss. Apart from internet hardware infrastructure, the VoIP transfer protocols cause the delay and packet loss problems as well. Typically, the Real-time Media Transfer Protocols (RTMTPs, such as the Real-time Transport Protocol (RTP, are working in conjunction with the transport layer protocols (TLPs to carry the VoIPapplications data. However, some of the TLPs protocols are transfer the VoIP applications data by themselves. The aim of this paper is to present the capability of the TLPs protocols to transfer the VoIP applications data, and the obstacles face these protocols to do so. For easier comparison and discussion, we have divided TLPs protocols into three groups, the Reliable Transport Layer Protocols (RTLPs, Unreliable Transport Layer Protocols (UTLPs, and Reliable and Unreliable Transport Layer Protocols (RUTLPs. We have studied the three groups from VoIP point of view. In addition, we have showed that the UTLPs group needs to work with the RTMTPs to be able to transfer the VoIP applications data. Finally, we have showed the problems caused by each group to the VoIP applications. As result, a comparison among the transport layer protocols is presented according to the problems resulting from theses protocols when transferring the VoIP applications data. The comparison can help to choose the suitable protocols to carry the VoIP data. However, after studied all the TLPs protocols, the paper recommend to use the UTLPs group in conjunction with the RTMTPs

  3. Programming and Application of Master/Slavery Station of Modbus Protocol Based on S7-200 PLC%基于S7-200 PLC的Modbus主从站编程与应用

    Institute of Scientific and Technical Information of China (English)

    熊田忠

    2012-01-01

    从工程需求出发,提出了利用 S7-200 PLC集成免费的Modbus RTU上站和从站通信库,以一个典型实例编程实现S7-200PLC作为工业自动化领域含Modbus通信协议的网络中间设备,具有很好的实用价值.%Programming application of master/slavery station of Modbus RTU protocol by S7-200 PLC is proposed originally from the engineering requirements. Due to its free and integrated Modbus RTU library, the S7-200 acts as a media device in the automation area including Modbus as a typical example. It shows that the method in this paper has a good practical value.

  4. Why some family planning program fail.

    Science.gov (United States)

    1976-04-01

    40 experts representing Nepal, Malaysia, Thailand, Singapore, Korea, and the Philippines participated in a 3-day workshop in Manila in March 1976 for the purpose of discussing and proposing ways of dealing with the financial problems confronting the population programs of the individual countries. The Inter-Governmental Coordinating Committee for Southeast Asia Family/Population Planning sponsored the workshop. The recommendations made at the meeting were: 1) standardization of financing reporting procedures by the region's country programs on family planning; 2) closer coordination between donor agencies and policy-making bodies of country programs in the disbursement of funds; 3) frequent exchanges of experiences, ideas, technicaL knowledge, and other matters pertaining to the financial management of such programs; and 4) inclusion of applicable financial management topics in the training of clinical staffs and those involved in follow-up operations. Additionally, a proposal was made that national population organizations or committees develop research and evaluation units. Workshop discussion sessions focused on financial planning and management, accounting and disbursement of funds, use and control of foreign aid, cost of effectiveness and benefit analysis, and financial reporting. PMID:12309355

  5. Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model

    Institute of Scientific and Technical Information of China (English)

    Xie Xiao-yao; Zhang Huan-guo

    2004-01-01

    The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze the trans action protocols in the application of electronic commerce.

  6. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  7. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show...

  8. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  9. Optimal protocols for slowly driven quantum systems.

    Science.gov (United States)

    Zulkowski, Patrick R; DeWeese, Michael R

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing. PMID:26465432

  10. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  11. Response characteristics of base-isolated structure with hardening-stopper type fail-safe devices

    International Nuclear Information System (INIS)

    In this study, a fail-safe mechanism for backing up the reliability of an isolator device is being developed predicated on the application of a base isolation system to nuclear fuel facilities. 'Fail-safe' is often understood to mean that when a device loses its function, a separate mechanism will work in order that there will be no trouble with regard to safety. However, since it may be considered extremely difficult to support loads without any trouble when the base isolation device itself loses its function, the term will be used here to mean that the base isolation device is supported so that it will not lose its function. The two points below will be made the objectives of design as workings of the fail-safe system in this study. 1) Response Displacement Control: Suppresses excessive deformation of the base isolation device even in case of input of an earthquake greater than the design seismic force to prevent destruction of the base isolation device, superstructure, and connected piping. 2) Response Acceleration Control: Reduces acceleration transmitted to the superstructure insofar as possible by action of the fail-safe mechanism. Characteristics tests and analyses, and earthquake observations using reduced-scale model have now been carried out to grasp the response characteristics of a base isolation combining high-damping rubber bearings and hardening-stopper type fail-safe mechanisms, and the results will be reported below. (author)

  12. Protocol Additional to the agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in the United Kingdom of Great Britain and Northern Ireland in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in the United Kingdom of Great Britain and Northern Ireland in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and the United Kingdom had met their respective internal requirements for entry into force

  13. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 July 2006, upon signature by the representatives of the Republic of the Fiji Islands and the Agency

  14. Protocol Additional to the agreement between the Republic of Paraguay and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Paraguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 15 September 2004, the date on which the Agency received from Paraguay written notification that Paraguay's statutory and/or constitutional requirements for entry into force had been met

  15. Protocol Additional to the agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the application of safeguards in connection with the treaty for the prohibition of nuclear weapons in Latin America and the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 18 February 2005, the date on which the Agency received from Nicaragua written notification that Nicaragua's statutory and/or constitutional requirements for entry into force had been met

  16. Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 June 2004, the date on which the Agency received from Cuba written notification that Cuba's statutory and/or constitutional requirements for entry into force had been met

  17. Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 24 March 1999 and signed in Vienna on 21 June 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2004, the date on which the Agency received from the Republic of Korea written notification that the Republic of Korea's statutory and/or constitutional requirements for entry into force had been met

  18. Protocol for a randomised controlled trial investigating the effectiveness of an online e health application for the prevention of Generalised Anxiety Disorder

    Directory of Open Access Journals (Sweden)

    Kenardy Justin

    2010-03-01

    Full Text Available Abstract Background Generalised Anxiety Disorder (GAD is a highly prevalent psychiatric disorder. Effective prevention in young adulthood has the potential to reduce the prevalence of the disorder, to reduce disability and lower the costs of the disorder to the community. The present trial (the WebGAD trial aims to evaluate the effectiveness of an evidence-based online prevention website for GAD. Methods/Design The principal clinical question under investigation is the effectiveness of an online GAD intervention (E-couch using a community-based sample. We examine whether the effect of the intervention can be maximised by either human support, in the form of telephone calls, or by automated support through emails. The primary outcome will be a reduction in symptoms on the GAD-7 in the active arms relative to the non active intervention arms. Discussion The WebGAD trial will be the first to evaluate the use of an internet-based cognitive behavioural therapy (CBT program contrasted with a credible control condition for the prevention of GAD and the first formal RCT evaluation of a web-based program for GAD using community recruitment. In general, internet-based CBT programs have been shown to be effective for the treatment of other anxiety disorders such as Post Traumatic Stress Disorder, Social Phobia, Panic Disorder and stress in clinical trials; however there is no evidence for the use of internet CBT in the prevention of GAD. Given the severe shortage of therapists identified in Australia and overseas, and the low rates of treatment seeking in those with a mental illness, the successful implementation of this protocol has important practical outcomes. If found to be effective, WebGAD will provide those experiencing GAD with an easily accessible, free, evidence-based prevention tool which can be promoted and disseminated immediately. Trial Registration Controlled-trials.com: ISRCTN76298775

  19. Improved protocol to purify untagged amelogenin - Application to murine amelogenin containing the equivalent P70→T point mutation observed in human amelogenesis imperfecta.

    Science.gov (United States)

    Buchko, Garry W; Shaw, Wendy J

    2015-01-01

    Amelogenin is the predominant extracellular protein responsible for converting carbonated hydroxyapatite into dental enamel, the hardest and most heavily mineralized tissue in vertebrates. Despite much effort, the precise mechanism by which amelogenin regulates enamel formation is not fully understood. To assist efforts aimed at understanding the biochemical mechanism of enamel formation, more facile protocols to purify recombinantly expressed amelogenin, ideally without any tag to assist affinity purification, are advantageous. Here we describe an improved method to purify milligram quantities of amelogenin that exploits its high solubility in 2% glacial acetic acid under conditions of low ionic strength. The method involves heating the frozen cell pellet for two 15min periods at ∼70°C with 2min of sonication in between, dialysis twice in 2% acetic acid (1:250 v/v), and reverse phase chromatography. A further improvement in yield is obtained by resuspending the frozen cell pellet in 6M guanidine hydrochloride in the first step. The acetic acid heating method is illustrated with a murine amelogenin containing the corresponding P70→T point mutation observed in an human amelogenin associated with amelogenesis imperfecta (P71T), while the guanidine hydrochloride heating method is illustrated with wild type murine amelogenin (M180). The self-assembly properties of P71T were probed by NMR chemical shift perturbation studies as a function of protein (0.1-1.8mM) and NaCl (0-367mM) concentration. Relative to similar studies with wild type murine amelogenin, P71T self-associates at lower protein or salt concentrations with the interactions initiated near the N-terminus.

  20. Performance comparison of hierarchical checkpoint protocols grid computing

    Directory of Open Access Journals (Sweden)

    Ndeye Massata NDIAYE

    2012-06-01

    Full Text Available Grid infrastructure is a large set of nodes geographically distributed and connected by a communication. In this context, fault tolerance is a necessity imposed by the distribution that poses a number of problems related to the heterogeneity of hardware, operating systems, networks, middleware, applications, the dynamic resource, the scalability, the lack of common memory, the lack of a common clock, the asynchronous communication between processes. To improve the robustness of supercomputing applications in the presence of failures, many techniques have been developed to provide resistance to these faults of the system. Fault tolerance is intended to allow the system to provide service as specified in spite of occurrences of faults. It appears as an indispensable element in distributed systems. To meet this need, several techniques have been proposed in the literature. We will study the protocols based on rollback recovery. These protocols are classified into two categories: coordinated checkpointing and rollback protocols and log-based independent checkpointing protocols or message logging protocols. However, the performance of a protocol depends on the characteristics of the system, network and applications running. Faced with the constraints of large-scale environments, many of algorithms of the literature showed inadequate. Given an application environment and a system, it is not easy to identify the recovery protocol that is most appropriate for a cluster or hierarchical environment, like grid computing. While some protocols have been used successfully in small scale, they are not suitable for use in large scale. Hence there is a need to implement these protocols in a hierarchical fashion to compare their performance in grid computing. In this paper, we propose hierarchical version of four well-known protocols. We have implemented and compare the performance of these protocols in clusters and grid computing using the Omnet++ simulator

  1. CCPA: Component-based communication protocol architecture for embedded systems

    Institute of Scientific and Technical Information of China (English)

    DAI Hong-jun; CHEN Tian-zhou; CHEN Chun

    2005-01-01

    For increased and various communication requirements of modem applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mode. We present the Component-Based Communication Protocol Architecture (CCPA) to make communication dynamic and configurable. It can develop, test and store the customized components for flexible reuse. The protocols are implemented by component assembly and support by configurable environments. This leads to smaller memory, more flexibility, more reconfiguration ability, better concurrency, and multiple data channel support.

  2. A Comparative Study of Various Routing Protocols in VANET

    CERN Document Server

    Kumar, Rakesh

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. F inally the paper concludes by a tabular comparison of the various routing protocols for VANET.

  3. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  4. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  5. CLINICAL EVALUATION OF FAILED ENDONASAL DCR OPERATIONS AND THEIR MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Mohammed Naveed

    2014-09-01

    Full Text Available INTRODUCTION: Endoscopic Intra nasal approach to by-pass the obstruction of lacrimal apparatus is a simple and commonly practiced surgery among the ENT Surgeons. Various modifications in the form of usage of micro drill, application of Mitomycin C and preserving the nasal flap to line the opening in the sac to name a few are being used. Recurrence of epiphora and closure of the neo opening is described and observed are labeled as failed endonasal DCR. This study makes an attempt to review retrospectively and prospectively to evaluate the degree of recurrence and causes of failure. OBJECTIVE OF THE STUDY: This study also attempts to determine the causes of failure of endonasal DCR and its subsequent management. Thus this study precludes the role of revision DCR. Materials and Methods: 50 patients who underwent endonasal DCR surgery at GGH Kurnool and reported with symptoms of returning of epiphora, purulent discharge from the eye were included. A detailed history taking and endoscopic examination done to find the cause of failure. An attempt is made to classify the causes and find suitable remedy.RESULTS:36% of the patients showed tendency to form synaechiae, 18.6% of patients presented with thick lacrimal crest, 9% of them showed formation of a thin veil like membrane over the neo-ostium. All the patients were subjected to revision surgery and subjective improvement in 92% of the patients reported at the time of reporting of the study.

  6. A Review: Multi Protocol Label Switching (Mpls

    Directory of Open Access Journals (Sweden)

    Rashed Qayoom Shawl,

    2014-01-01

    Full Text Available The demand for technology called MPLS is increasing day by day in most internet service provider networks. Majority of the carriers are deploying MPLS in their backbone networks to facilitate a number of services and applications such as virtual private networks, quality of service (QoS and traffic engineering. MPLS is a scalable, protocol-independent protocol. MPLS allows for creating end-to-end circuits across any type of transport medium using any protocol. The primary benefit of MPLS is to eliminate the dependence on a particular OSI model data-link layer technology such as asynchronous transfer mode (ATM, Frame Relay or Ethernet and eliminates the need for multiple layer-2 networks to satisfy different types of traffic. This paper reflects a detailed overview on MPLS with its architectural terminology, working and the services that it offers.

  7. Chapter 22: Compressed Air Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  8. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  9. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  11. SECURE SHORT MESSAGE PEER-TO-PEER PROTOCOL

    Directory of Open Access Journals (Sweden)

    Saurabh Samanta

    2012-06-01

    Full Text Available Short Message Service (SMS has become an extension of our lives and plays an important role in daily chores. SMS is a popular medium for delivering Value Added Services and are suitable for mobile banking, payment reminders, SOS calls, stock and news alerts, railway and flight enquiries etc. These types of messages are normally computer generated messages sent over Short Message Peer-to-Peer (SMPP protocol. SMPP is an application layer protocol to send messages over TCP/IP connection. SMPP protocol has no security measures specified which allows fast delivery of SMS messages in bulk. Compromised messages or loss of messages can cause lot of revenue loss and fatal consequences. A secure SMPP protocol is proposed and implemented by introducing Transport Layer Security (TLS with SMPP protocol specifications. A client tool is developed to securely connect to the server. Secure Short Message Peer-to-Peer protocol will enhance the security of fast growing messaging and telecommunication world.

  12. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...... demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric key protocols such as Needham-Schroeder, Otway-Rees, Yahalom and Andrew Secure RPC....

  13. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques...

  14. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  15. Implementing a knowledge application program for anxiety and depression in community-based primary mental health care: a multiple case study research protocol

    OpenAIRE

    Roberge, Pasquale; Fournier, Louise; Brouillet, Hélène; Hudon, Catherine; Houle, Janie; Provencher, Martin D.; Lévesque, Jean-Frédéric

    2013-01-01

    Background Anxiety and depressive disorders are increasingly recognized as a health care policy priority. Reducing the treatment gap for common mental disorders requires strengthening the quality of primary mental health care. We developed a knowledge application program designed to improve the organization and delivery of care for anxiety and depression in community-based primary mental health care teams in Quebec, Canada. The principal objectives of the study are: to implement and evaluate ...

  16. Assessing the effect of an interactive decision-aid smartphone smoking cessation application (app) on quit rates: a double-blind automated randomised control trial protocol

    OpenAIRE

    BinDhim, Nasser F; McGeechan, Kevin; Trevena, Lyndal

    2014-01-01

    Introduction In a previous study exploring the feasibility of a smoking cessation application (app), we found that about 77% of the respondents from three countries were ready to quit in the next 30 days without significant differences between countries in terms of age, operating system and number of quitting attempts. However, the efficacy of smartphone apps for smoking cessation has not yet been established. This study tests the efficacy of a smartphone smoking cessation decision-aid app co...

  17. Childhood obesity: parents fail to recognise, general practitioners fail to act.

    Science.gov (United States)

    White, A; O'Brien, B; Houlihan, T; Darker, C; O'Shea, B

    2012-01-01

    General Practitioners (GPs) have an important role to play in recognition of and intervention against childhood obesity in Ireland. Data were collected prospectively on a cohort of children aged 4-14 and their parents (n = 101 pairs) who attended consecutively to a semi-rural group general practice. Parents estimated their child's weight status. Actual weight status was determined for both parent and child using the United States Centres' for Disease Control's BMI-for-age references. 15 (14.9%) of the children and 49 (51.6%) of the parents were overweight or obese. While 71 (95.5%) of normal weight status children were correctly identified, parents showed poor concordance in identifying their children as overweight 2 (18.2%) or obese 0 (0%). BMI was only evidently recorded in the clinical records of 1 out of 15 cases of overweight children identified. With parents failing to recognise childhood obesity, GPs have a responsibility in tackling this problem at a family level.

  18. Childhood obesity: parents fail to recognise, general practitioners fail to act.

    LENUS (Irish Health Repository)

    White, A

    2012-01-01

    General Practitioners (GPs) have an important role to play in recognition of and intervention against childhood obesity in Ireland. Data were collected prospectively on a cohort of children aged 4-14 and their parents (n = 101 pairs) who attended consecutively to a semi-rural group general practice. Parents estimated their child\\'s weight status. Actual weight status was determined for both parent and child using the United States Centres\\' for Disease Control\\'s BMI-for-age references. 15 (14.9%) of the children and 49 (51.6%) of the parents were overweight or obese. While 71 (95.5%) of normal weight status children were correctly identified, parents showed poor concordance in identifying their children as overweight 2 (18.2%) or obese 0 (0%). BMI was only evidently recorded in the clinical records of 1 out of 15 cases of overweight children identified. With parents failing to recognise childhood obesity, GPs have a responsibility in tackling this problem at a family level.

  19. Pictorial essay: Role of ultrasound in failed carpal tunnel decompression

    Directory of Open Access Journals (Sweden)

    Rajesh Botchu

    2012-01-01

    Full Text Available USG has been used for the diagnosis of carpal tunnel syndrome. Scarring and incomplete decompression are the main causes for persistence or recurrence of symptoms. We performed a retrospective study to assess the role of ultrasound in failed carpal tunnel decompression. Of 422 USG studies of the wrist performed at our center over the last 5 years, 14 were for failed carpal tunnel decompression. Scarring was noted in three patients, incomplete decompression in two patients, synovitis in one patient, and an anomalous muscle belly in one patient. No abnormality was detected in seven patients. We present a pictorial review of USG findings in failed carpal tunnel decompression.

  20. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Affoua Thérèse Aby

    2016-06-01

    Full Text Available Wireless sensor networks (WSNs are increasingly used in environmental monitoring applications. They are designed to operate for several months by featuring low activity cycles in order to save energy. In this paper, we propose a Medium Access Control (MAC protocol for suchWSNs with very low duty-cycles of 1% and less. Nodes are activated randomly and use a history of previous successful frame exchanges to decide their next activation time. We study the choice of the history size, and we compare the performance of our protocol with other protocols from the literature. We show by simulations and real experiments that with a limited history size of only six entries, our protocol achieves better performance than other protocols from the literature, while keeping the advantages of fully asynchronous protocols.

  1. Analysis on Ad Hoc Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.N.Renjith

    2012-12-01

    Full Text Available Outlook of wireless communication system marked an extreme transform with the invention of Wireless Sensor Networks (WSN. WSN is a promising technolog y for enabling a variety of applications like environmental monitoring, security and applications that save our lives and assets. In WSN, large numbers of sensor nodes are deployed to sensing and gathering information and forward them to the base station with the help of routing protocol. Routing protocols plays a major role by identifying and maintaining the routes in the network. Competence o f sensor networks relay on the strong and effective routing protocol used. In this paper, we present a simulation based performance evaluation of differen t Ad hoc routing protocols like AODV, DYMO, FSR, LANM AR, RIP and ZRP in Wireless Sensor Networks. Based on the study, the future research areas and k ey challenges for routing protocol in WSN are to optimize network performance for QoS support and en ergy conservation

  2. Nr 621 - Report on the behalf of the Commission of foreign affairs, defence and armed forces on the bill project on the application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998

    International Nuclear Information System (INIS)

    This report concerns an additional protocol which aims at reinforcing the efficiency of the international guarantee system. This system is part of an international approach for the struggle against nuclear weapon proliferation. The authors outline the necessary evolution of law to deal with the risk of development of clandestine military nuclear programs. They present the role of the IAEA, its organisation, its financing, and outline its reinforced role within the frame of the NPT (Non Proliferation Treaty) and of generalised guarantee agreements (a typology of these agreements is given). They also outline the limits of this guarantee system, and the necessity of its adaptation through an additional protocol. They discuss the difficulty of an international application (notably in the cases of Iran and North Korea). The articles are then discussed. They deal with definitions, declaration obligations, international verification, penal arrangements, arrangements related to overseas territories and other arrangements. The commission discussion is reported, and tables give comparisons between agreements

  3. Une approche pour la composition autonome de services de communication orientés QoS. Application aux protocoles de transport configurables

    OpenAIRE

    Van Wambeke, Nicolas

    2009-01-01

    Les dernières évolutions de l’Internet se sont traduites par l’émergence de nouvelles applications distribuées et par la multiplication des technologies réseaux (sans fils, mobiles. . . ) ainsi que des services offerts par les opérateurs sur de nouveaux types de terminaux (portable, PDA. . . ). L’enjeu socio économique majeur de ces avancées est le futur Internet ambiant, à la fois ubiquitaire et intelligent, au travers duquel l’utilisateur pourra, quelle que soit sa localisation ...

  4. Failing The Final Exam In Equal Employment And Opportunity

    Directory of Open Access Journals (Sweden)

    Greg Tower

    2011-07-01

    Full Text Available Anglo-American educational global leaders are failing the final exam for overall transparency of EEO activities with over 90% non-disclosure.  Australian entities should be modeled as important communication exemplars.

  5. Council tax precept failed to cover cost of NLW.

    Science.gov (United States)

    2016-08-01

    Charging residents extra council tax to help pay for social care is insufficient to cover current funding gaps and has failed to cover the cost of the national living wage (NLW), a report warns. PMID:27573947

  6. Addressing Mobility in Wireless Sensor Media Access Protocol

    OpenAIRE

    Huan Pham; Sanjay Jha

    2005-01-01

    Handling mobility in wireless sensor networks presents several new challenges. Techniques developed for other mobile networks, such as mobile phone or mobile adhoc networks can not be applicable, as in these networks energy is not a very critical resource. This paper presents a new adaptive Mobility-aware Sensor MAC protocol (MS-MAC) for mobile sensor applications. In MS-MAC protocol, a node detects its neighbor's mobility based on a change in its received signal level from the neighbor, or a...

  7. Transfusion protocol in trauma

    Directory of Open Access Journals (Sweden)

    Kaur Paramjit

    2011-01-01

    Full Text Available Blood and blood components are considered drugs because they are used in the treatment of diseases. As with any drug, adverse effects may occur, necessitating careful consideration of therapy. Like any other therapeutic decision, the need for transfusion should be considered on the basis of risks and benefits and alternative treatments available to avoid over- and under-transfusion. This review is focused on the blood transfusion protocol in trauma patients with hemorrhagic shock. Besides, issues related to emergency and massive transfusion have also been elaborated. We conducted a comprehensive MEDLINE search and reviewed the relevant literature, with particular reference to emergency medical care in trauma.

  8. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  9. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  10. Provenance Query Protocol

    OpenAIRE

    Miles, S.; Moreau, L; Groth, P; Tan, V.; Munroe, S; Jiang, Sheng

    2006-01-01

    A related document defines schemas to be used for documentation about the execution of a process. It also defines the provenance of a data item as the process that led to that item. A provenance query is a query for the provenance of a data item and the results of such a query is documentation of the process that led to the item. In this document, we specify a protocol by which a querying actor and provenance store can communicate in performing a provenance query. This primarily takes the for...

  11. Application and development of ZigBee based on Z-stack protocol stack ZCL and conform to HA specification%基于Z-stack协议栈ZCL库且符合HA规范的ZigBee应用开发

    Institute of Scientific and Technical Information of China (English)

    姚志鹏

    2013-01-01

    The protocol standards of ZigBee products in native market are all in the status quo of disunity and the ZigBee products with single standard are in demanded. For this reason, the basic procedures and notes of Z-stack-based ZigBee developing applications conform to HA specification was concluded after studying and analyzing the codes and standards made by ZigBee Alliance. In combination with the structure features and the function library of Z-stack, the ZigBee application and development flow based on Z-stack to realize HA specification are summed up, and relevant matters needing attention as well.%  鉴于国内ZigBee产品协议标准不统一的现状和市场对符合统一标准的ZigBee产品的需求,为了实现基于Z-stack协议栈且符合HA规范的应用开发,通过对ZigBee联盟制定的相关规范和标准文件的学习和解读,结合Z-stack协议栈的结构特点及其提供的函数库,总结归纳了基于该协议栈来实现HA规范的ZigBee应用开发的基本流程和相关注意事项。

  12. Application of IPv6 Protocol in Web Portals of Ministry of Water Resources%IPv6 在水利部门户网站群中的应用

    Institute of Scientific and Technical Information of China (English)

    杨非; 陈国旭; 花基尧; 刘庆涛; 姚葳; 杨柳; 胡亚丽; 魏永静; 李珊珊; 王昊源

    2016-01-01

    随着互联网和计算机技术的快速发展,IPv4网络协议自身问题正逐渐凸显,地址空间日趋不足。系统介绍IPv6在水利部门户网站群中的应用,重点解决由IPv4向IPv6转化迁移中的技术问题,有效应对IPv6与IPv4在一段时间内相互共存的困扰。其对网络环境、应用系统的升级改造,对类似项目建设具有重要借鉴意义。%With the rapid development of Internet and computer technology, the problem of IPv4 network protocol is becoming more and more prominent. And the address space is becoming less and less. This paper describes the application of IPv6 in the water resources department portal group, focusing on solving the technical problems from the IPv4 to IPv6 transformation and migration, and effectively deals with the IPv4 and IPv6 in a period of mutual coexistence of the troubles. Its upgrade to the network environment and application systems has an important reference for the construction of similar projects.

  13. Efficacy and tolerance of the topical application of potassium hydroxide (10% and 15% in the treatment of molluscum contagiosum: Randomized clinical trial: Research protocol

    Directory of Open Access Journals (Sweden)

    Galindo Gisela

    2011-10-01

    Full Text Available Abstract Background Molluscum contagiosum is a non-severe pediatric viral infection. Because it is highly contagious and current treatments have negative aesthetic and psychological effects, we want to test an alternative treatment in the primary care setting, consisting of two different concentrations of potassium hydroxide solution. Methods/design The study design is a double-blind, randomized clinical trial, using three types of topical treatment. The treatment consist of daily applications of potassium hydroxide (KOH in aqueous solution at 10% and 15% concentration, and a placebo administered in the control group. Four follow-up visits (at 15, 30, 45 and 60 days are planned to evaluate treatment effectiveness and patient tolerance. The main outcome measure of the trial will be the healing rate, defined as lesion disappearance in the affected zones after the topic application of the experimental treatment. Secondary measures will be the principal characteristics and evolution of the affected zone (surface area, number of lesions, size and density of lesions, treatment tolerance (hyperpigmentation, itching, burning, pain, recurrence rate and the natural evolution of lesions in the control group. Discussion KOH can potentially be an effective and safe treatment for MC in primary care, and can also reduce referrals to dermatologists and hospital pediatric departments. In addition, KOH may be a valid and less expensive alternative to current invasive treatments (surgical excision. Trial Registration ClinicalTrials.gov: NCT01348386

  14. The ugly twins: failed global sourcing projects and their substitutes

    OpenAIRE

    Schiele, Holger; Horn, Philipp; Werner, Welf

    2010-01-01

    Purpose of the paper and literature addressed: Analyzing the impact of failed global sourcing projects on the entire commodity group and exploring isomorphism as potential antecedent to the observed phenomenon. The paper is embedded in the global sourcing literature, as well as isomorphism and total cost analysis. Research method: Secondary data analysis. Research findings: 1) Each failed global sourcing project had an “ugly twin”, i.e. the material which was not delivered by the new supplier...

  15. The Failed State and the State of Failure

    Directory of Open Access Journals (Sweden)

    Peter Hitchcock

    2008-01-01

    Full Text Available What does Marx have to say about the “failed state”? Less than one might think. Peter Hitchcock seizes on the problem of the organic composition of capital to bring theories of state sovereignty and its dissolution into chiastic relation with Marxist political economy. This flexibly-bound double of Marxism and failed-state theory then offers a new perspective on our current moment and its possible futures.

  16. The Failed State and the State of Failure

    OpenAIRE

    Peter Hitchcock

    2008-01-01

    What does Marx have to say about the “failed state”? Less than one might think. Peter Hitchcock seizes on the problem of the organic composition of capital to bring theories of state sovereignty and its dissolution into chiastic relation with Marxist political economy. This flexibly-bound double of Marxism and failed-state theory then offers a new perspective on our current moment and its possible futures.

  17. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  18. Updatable Queue Protocol Based On TCP For Virtual Reality Environment

    CERN Document Server

    Al-Howaide, Ala'a Z; Salhieh, Ayad M

    2011-01-01

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements of these applications make the scalability problem more difficult to solve. In this paper, we have implemented Updatable Queue Abstraction protocol (UQA) on TCP (TCP-UQA) and compared it with original TCP, UDP, and Updatable Queue Abstraction based on UDP (UDP-UQA) protocols. Results showed that TCP-UQA was the best in queue management.

  19. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  20. EMMP :a highly efficient membership management protocol

    Institute of Scientific and Technical Information of China (English)

    LI Renfa; XIE Yunlong; WEN Jigang; YUE Guangxue

    2007-01-01

    Gossip (or epidemic) algorithms have recently become popular solutions to multicast message dissemination in peer-to-peer systems.Nevertheless,it is not straightforward to apply gossip to on-demand streaming because it often fails to achieve a timely delivery.To solve this problem and taking into account the characteristic of peers randomly joining and leaving in peer-to-peer systems,an Efficient Membership Management Protocol (EMMP) has been presented.Every node only needs to keep contact with O (log(N)) nodes,and EMMP can support the reliable dissemination of messages.Considering the "distance" between peers,it causes the major data to be transmitted in a local area and reduces the backbone's traffic,and speeds up the dissemination of messages between peers.This paper has adopted the"goodfriend" mechanism to reduce the influence on the system when a peer fails or leaves.Simulation results show that EMMP is highly efficient,and both the redundancy and the delay of the system are well solved.

  1. Behavioral activation-based guided self-help treatment administered through a smartphone application: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ly Kien

    2012-05-01

    Full Text Available Abstract Background The need for cost-effective interventions for people suffering from major depressive disorders is essential. Behavioral activation is an intervention that can largely benefit from the use of new mobile technologies (for example smartphones. Therefore, developing smartphone-based behavioral activation interventions might be a way to develop cost-effective treatments for people suffering from major depressive disorders. The aim of this study will be to test the effects of a smartphone-delivered behavioral activation treatment. Methods The study will be a randomized controlled trial with a sample size of 120 participants, with 60 patients in each group. The treatment group includes an 8-week smartphone-based behavioral activation intervention, with minimal therapist contact. The smartphone-based intervention consists of a web-based psychoeducation, and a smartphone application. There is also a back-end system where the therapist can see reports from the patients or activities being reported. In the attention control group, we will include brief online education and then recommend use of a smartphone application that is not directly aimed at depression (for example, ‘Effective meditation’. The duration of the control condition will also be 8 weeks. For ethical reasons we will give the participants in the control group access to the behavioral activation treatment following the 8-week treatment period. Discussions We believe that this trial has at least three important implications. First, we believe that smartphones can be integrated even further into society and therefore may serve an important role in health care. Second, while behavioral activation is a psychological treatment approach for which there is empirical support, the use of a smartphone application could serve as the therapist’s prolonged arm into the daily life of the patient. Third, as we have been doing trials on guided Internet treatment for more than 10

  2. Comparison of The Effectiveness of Clomiphene Citrate versus Letrozole in Mild IVF in Poor Prognosis Subfertile Women with Failed IVF Cycles

    Directory of Open Access Journals (Sweden)

    Mesut Oktem

    2015-10-01

    Full Text Available Background: Our objective was to evaluate the effectiveness of clomiphene citrate (CC vs. letrozole (L plus human menopausal gonadotropin (hMG in gonadotropin releasing hormone (GnRH antagonist protocol in poor prognosis women with previous failed ovarian stimulation undergoing intracytoplasmic sperm injection (ICSI. Materials and Methods: This retrospective cohort study included cycles with CC and L plus hMG/GnRH antagonist protocols of 32 poor responders who had failed to have ideal follicles to be retrieved during oocyte pick-up (OPU or embryo transfer (ET at least for 2 previous in vitro fertilization (IVF cycles with microdose flare protocol or GnRH antagonist protocol from January 2006 to December 2009. Main outcome measures were implantation, clinical pregnancy and live birth rates per cycle. Duration of stimulation, mean gonadotropin dose used, endometrial thickness, number of mature follicles, serum estradiol (E2 and progesterone (P levels on the day of human chorionic gonadotropin (hCG administration, number of retrieved oocytes and fertilization rates were also evaluated. Results: A total number of 42 cycles of 32 severe poor responders were evaluated. Total gonadotropin consumption was significantly lower (1491 ± 873 vs. 2808 ± 1581 IU, P=0.005 and mean E2 level on the day of hCG injection were significantly higher in CC group than L group (443.3 ± 255.2 vs. 255.4 ± 285.2 pg/mL, P=0.03. ET, overall pregnancy and live birth rates per cycle were significantly higher in CC than L protocol (27.2 vs. 15%, 13.6 vs. 0% and 4.5 vs. 0%, respectively, P<0.05. Conclusion: Severe poor responders who had previously failed to respond to microdose or GnRH antagonist protocols may benefit from CC plus hMG/GnRH antagonist protocol despite high cancellation rate.

  3. Efficient recovery of whole blood RNA - a comparison of commercial RNA extraction protocols for high-throughput applications in wildlife species

    Directory of Open Access Journals (Sweden)

    Schwochow Doreen

    2012-06-01

    Full Text Available Abstract Background Since the emergence of next generation sequencing platforms, unprecedented opportunities have arisen in the study of natural vertebrate populations. In particular, insights into the genetic and epigenetic mechanisms of adaptation can be revealed through study of the expression profiles of genes. However, as a pre-requisite to expression profiling, care must be taken in RNA preparation as factors like DNA contamination, RNA integrity or transcript abundance can affect downstream applications. Here, we evaluated five commonly used RNA extraction methods using whole blood sampled under varying conditions from 20 wild carnivores. Results Despite the use of minute starting volumes, all methods produced quantifiable RNA extracts (1.4 – 18.4 μg with varying integrity (RIN 4.6 - 7.7, the latter being significantly affected by the storage and extraction method used. We observed a significant overall effect of the extraction method on DNA contamination. One particular extraction method, the LeukoLOCK™ filter system, yielded high RNA integrity along with low DNA contamination and efficient depletion of hemoglobin transcripts highly abundant in whole blood. In a proof of concept sequencing experiment, we found globin RNA transcripts to occupy up to ¼ of all sequencing reads if libraries were not depleted of hemoglobin prior to sequencing. Conclusion By carefully choosing the appropriate RNA extraction method, whole blood can become a valuable source for high-throughput applications like expression arrays or transcriptome sequencing from natural populations. Additionally, candidate genes showing signs of selection could subsequently be genotyped in large population samples using whole blood as a source for RNA without harming individuals from rare or endangered species.

  4. The Text of the Agreement between the Lesotho and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with the Kingdom of Lesotho to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  5. Agreement between the Holy See and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An agreement by Exchange of Letters with the Holy See to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between the Holy See and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  6. The Text of the Agreement of 14 January 1980 between Senegal and the Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons. An Agreement by Exchange of Letters with Senegal to amend the Protocol to the Safeguards Agreement

    International Nuclear Information System (INIS)

    The text of the Exchange of Letters, constituting an agreement to amend the Protocol to the Agreement between Senegal and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, is reproduced in this document for the information of all Member States of the Agency

  7. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  8. Securing Zone Routing Protocol in Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-09-01

    Full Text Available This paper is a contribution in the field of security analysis on mobile ad-hoc networks, and security requirements of applications. Limitations of the mobile nodes have been studied in order to design a secure routing protocol that thwarts different kinds of attacks. Our approach is based on the Zone Routing Protocol (ZRP; the most popular hybrid routing protocol. The importance of the proposed solution lies in the fact that it ensures security as needed by providing a comprehensive architecture of Secure Zone Routing Protocol (SZRP based on efficient key management, secure neighbor discovery, secure routing packets, detection of malicious nodes, and preventing these nodes from destroying the network. In order to fulfill these objectives, both efficient key management and secure neighbor mechanisms have been designed to be performed prior to the functioning of the protocol.To validate the proposed solution, we use the network simulator NS-2 to test the performance of secure protocol and compare it with the conventional zone routing protocol over different number of factors that affect the network. Our results evidently show that our secure version paragons the conventional protocol in the packet delivery ratio while it has a tolerable increase in the routing overhead and average delay. Also, security analysis proves in details that the proposed protocol is robust enough to thwart all classes of ad-hoc attacks.

  9. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  10. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  11. FAIL-MPI: How fault-tolerant is fault-tolerant MPI ?

    OpenAIRE

    Hérault, Thomas; Hoarau, William; Lemarinier, Pierre; Rodriguez, Eric; Tixeuil, Sébastien

    2006-01-01

    One of the topics of paramount importance in the development of Cluster and Grid middleware is the impact of faults since their occurrence probability in a Grid infrastructure and in large-scale distributed system is actually very high. MPI (Message Passing Interface) is a popular abstraction for programming distributed computation applications. FAIL is an abstract language for fault occurrence description capable of expressing complex and realistic fault scenarios. In this paper, we investig...

  12. Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.

    Science.gov (United States)

    Yang, Ang; Nam, Junghyun; Kim, Moonseong; Choo, Kim-Kwang Raymond

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  13. Development of a Quantitative Polymerase Chain Reaction Detection Protocol for Cercospora kikuchii in Soybean Leaves and Its Use for Documenting Latent Infection as Affected by Fungicide Applications.

    Science.gov (United States)

    Chanda, A K; Ward, N A; Robertson, C L; Chen, Z-Y; Schneider, R W

    2014-10-01

    Cercospora leaf blight (CLB) of soybean, caused by Cercospora kikuchii, is a serious disease in the southern United States. A sensitive TaqMan probe-based real-time quantitative polymerase chain reaction (qPCR) assay was developed to specifically detect and quantify C. kikuchii in naturally infected soybean plants. The sensitivity was 1 pg of genomic DNA, which was equivalent to about 34 copies of genome of C. kikuchii. Using this qPCR assay, we documented a very long latent infection period for C. kikuchii in soybean leaves beginning at the V3 growth stage (as early as 22 days after planting). The levels of biomass of C. kikuchii remained low until R1, and a rapid increase was detected from the R2/R3 to R4/R5 growth stages shortly before the appearance of symptoms at R6. The efficacy of various fungicide regimens under field conditions also was evaluated over a 3-year period using this qPCR method. Our results showed that multiple fungicide applications beginning at R1 until late reproductive stages suppressed the development of C. kikuchii in leaves and delayed symptom expression. Different fungicide chemistries also had differential effects on the amount of latent infection and symptom expression during late reproductive growth stages.

  14. Report realized on the behalf of the Foreign Affairs Commission on the law project, adopted by the Senate, authorizing the added protocol ratification to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the guaranties application in France; Rapport fait au nom de la Commission des Affaires Etrangeres sur le projet de Loi, adopte par le Senat, autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-02-01

    This document presents the analyse of the law project, adopted by the Senate, authorizing the added protocol ratification to the agreement between France, the Atomic Energy European Community and the International Atomic Energy Agency relative to the guaranties application in France. It deals with the nuclear proliferation fight in France and the the program of enhancement of guaranties in the framework of the IAEA. (A.L.B.)

  15. Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications

    Directory of Open Access Journals (Sweden)

    Jehad Al Dallal

    2008-01-01

    Full Text Available Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC from a given service specification (S-SPEC. The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.

  16. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...

  17. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures

    OpenAIRE

    Renggaman, Anriansyah; Choi, Hong L.; Sudiarto, Sartika IA; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Abstract Background Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assura...

  18. Mobile Ad Hoc Networks: A Comparative Study of QoS Routing Protocols

    CERN Document Server

    Gangwar, Sanjeev; Kumar, Krishan

    2012-01-01

    This Article presents a thorough overview of QoS routing metrics, resources and factors affecting performance of QoS routing protocols. The relative strength, weakness, and applicability of existing QoS routing protocols are also studied and compared. QoS routing protocols are classified according to the QoS metrics used type of QoS guarantee assured.

  19. Selective and cost effective protocol to separate bioactive triterpene acids from plant matrices using alkalinized ethanol: Application to leaves of Myrtaceae species

    Directory of Open Access Journals (Sweden)

    Adélia M. Belem Lima

    2015-01-01

    Full Text Available Background: Triterpenes as betulinic (BA, oleanolic (OA and ursolic acids (UA have increasingly gained therapeutic relevance due to their wide scope of pharmacological activities. To fit large scale demands, exploitable sources of these compounds have to be found and simple, cost effective methods to extract them developed. Leaf material represents the best plant sustainable raw material. To obtain triterpene acid rich extracts from leaves of Eugenia, Psidium and Syzygium species (Myrtaceae by directly treating the dry plant material with alkalinized hydrated ethanol. This procedure was adapted from earlier methods to effect depolymerization of the leaf cutin. Materials and Methods: Extracts were prepared by shaking the milled dry leaves in freshly prepared 2% NaOH in 95% EtOH solution (1:4 w/v at room temperature for 6 h. Working up the product in acidic aqueous medium led to clear precipitates in which BA, OA and UA were quantified by gas chromatography. Results: Pigment free and low polyphenol content extracts (1.2–2.8% containing 6–50% of total triterpene acids were obtained for the six species assayed. UA (7–20% predominated in most extracts, but BA preponderated in Eugenia florida (39%. Carried out in parallel, n hexane defatted leaves led to up to 9% enhancement of total acids in the extracts. The hydroalcoholate treatment of Myrtaceae species dry leaves proved to be a cost effective and environmentally friendly method to obtain triterpene acids, providing them be resistant to alkaline medium. These combined techniques might be applicable to other plant species and tissues.

  20. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  1. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  2. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...

  3. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  4. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna

  5. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001

  6. Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 30 October 2013 in St. John's, Antigua and Barbuda, and on 15 November 2013 in Vienna, Austria

  7. A Geographical Heuristic Routing Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Luis Urquiza-Aguiar

    2016-09-01

    Full Text Available Vehicular ad hoc networks (VANETs leverage the communication system of Intelligent Transportation Systems (ITS. Recently, Delay-Tolerant Network (DTN routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation.

  8. Analysis of the impact of hello protocol parameters over a wireless network self-organization

    OpenAIRE

    Razafindralambo, Tahiry; Mitton, Nathalie

    2007-01-01

    International audience The neighborhood discovery and its maintenance are very important in wireless networks for any applications, especially for routing and every self-$*$ algorithm. Neighbor nodes are usually discovered thanks to the use of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self-organizing the network. Most of layer-$3$ protocols assume an ideal MAC layer. In such a case, HELLO protocol parameters have no impact over t...

  9. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  10. Study of Modbus protocol and application in oil field control system%Modbus通信协议研究及在油田控制系统中的应用

    Institute of Scientific and Technical Information of China (English)

    王超

    2014-01-01

    As an open protocol, Modbus is widespread in communication between systems or system and device in oil and natural gas ifeld. In this paper, Modbus communication rules and the implementation over serial link or TCP/IP is generally analyzed. As an instance of communication between systems, Modbus over RS-485 application in Integrated Control and Safety System of Central Treatment and Export Plant, YADA Oil Field, Iran is introduced.%在石油天然气行业,Modbus作为一种开放的应用协议,被广泛的应用于系统间、系统与设备间的通信。本文对Modbus协议及其在串行链路、TCP/IP上的通信机制作了简要剖析,并以伊朗雅达油田中心处理站集成控制系统为例,简要介绍RS-485串行总线上的Modbus在系统通信中的重要作用。

  11. 单片机Modbus/TCP协议在大功率整流设备中的应用%Application of Modbus/TCP Protocol Based on Single Chip Microproccesor.in High Power Rectifier Equipment

    Institute of Scientific and Technical Information of China (English)

    梁丁; 欧阳波

    2012-01-01

    Uses the open-type Modbus/TCP standard, establishes the UIP1.0 agreement stack, and inserts the Modbus application agreement to complete Modbus to the UIP protocol conversion. Sets up the industry ethernet using the Modbus/TCP agreement in the high efficiency rectifier unit's monolithic integrated circuit controller and between the superior machine configuration king software. After all previous experiment, this systems operation is stable, the speed is quick.%采用开放型Modbus/TCP规范,建立UIP1.0协议栈,并嵌入Modbus应用协议完成Modbus到UIP的协议转换。利用Modbus/TCP协议在大功率整流设备的单片机控制器与上位机组态王软件之间组建工业以太网。经过历次实验,该系统运行稳定,速度较快。

  12. A survey of failed post-retained restorations

    DEFF Research Database (Denmark)

    Peutzfeldt, A; Sahafi, A; Asmussen, E

    2008-01-01

    to identify factors critical to failure and to type of failure. A questionnaire was mailed to private practitioners in Denmark with a request to complete the questionnaire whenever a patient presented with a failed post-retained restoration. Information was gathered on factors related to the patient......, the tooth, the restorative materials, and the techniques. Two-hundred and sixty questionnaires were collected from 171 practitioners over a 3-year period. Functioning time until failure varied between 3 months and 38 years. Mean survival time until failure was 11 years. Of the failed restorations, 61% had...

  13. Failed MTR Fuel Element Detect in a Sipping Tests

    International Nuclear Information System (INIS)

    This work describes sipping tests performed on Material Testing Reactor (MTR) fuel elements of the IEA-R1 research reactor, in order to find out which one failed in the core during a routine operation. Radioactive iodine isotopes 131I and 133I, employed as failure monitors, were detected in samples corresponding to the failed fuel element. The specific activity of each sample, as well as the average leaking rate, were measured for 137Cs. The nuclear fuels U3O8 - Al dispersion and U - Al alloy were compared concerning their measured average leaking rates of 137Cs

  14. 基于VRRP协议实现路由冗余和负载均衡的应用研究%The Research and Application of VRRP Protocol on Routing Redundancy and load Balancing

    Institute of Scientific and Technical Information of China (English)

    谷宝磊

    2014-01-01

    With the rapid popularization of computer network,a variety of network applications(OA systems,voice sys-tems,video surveillance systems)become increasingly complex,the importance of the network transmission of data, complexity is increasing,users require network has a high degree of redundancy. For the end user in the network,it is desirable from time to time to maintain good communication with the rest of the network part. Virtual Routing Protocol (VRRP,Virtual Router Redundancy Protocol)provides a way to ensure a reliable end-user contact your network with-out interruption. For network reliability and security requirements,VRRP not only in highly redundant network layer to ensure that the system,but also can achieve load balancing network traffic.%随着计算机网络的迅速普及,网络的各种应用(OA系统、语音系统、网络视频监控系统)日趋复杂,网络上传输数据的重要性、复杂性也越来越高,用户要求网络具有高度的冗余性。对于网络中的终端用户来说,希望时时与网络中的其他部分保持良好的通信。虚拟路由协议(VRRP,Virtual Router Redundancy Protocol)提供一种方法,能够保证终端用户与网络的联系可靠而不中断。出于网络可靠性和安全性的要求,VRRP不仅能够在网络层保证系统的高度冗余,同时还可以实现网络流量的负载均衡。

  15. The preliminary applications of IPv6 network protocol to the seismic data transmission%IPv6网络应用于地震信息传输初探

    Institute of Scientific and Technical Information of China (English)

    林洋; 张颖

    2015-01-01

    The use of IPv6 network protocol is an inevitable development trend of Internet. The transition process from IPv4 to IPv6 networks will take a long period. In this transition period two protocols will co-exist. This paper introduces the basic concepts of IPv6 , IPv6 networking technology currently used and applications of IPv6 in the seismic data transmission in Earthquake Administration of Sichuan Province. The seismic information network is di-vided into three level structures, which means state, province and seismic station. The new IPv6 used in demon-strative seismic station will satisfy the structure of three levels and the Tunnel Encapsulation Technology is also used. Routers with both IPv4 and IPv6 are installed in the Seismic Standard Station of Chengdu to transit success-fully the seismic data to China Earthquake Network Center.%IPv6网络是互联网发展的必然趋势。而从IPv4网络过渡到IPv6网络将是一个漫长的过程,在这个过渡时期两者将并存。本文介绍了IPv6的基本概念和目前常用的IPv6组网技术,以及在四川省地震局的应用。由于地震信息网络是“国家—省—台站、市县”三层结构,在IPv6示范台站建设时仍遵循该结构,在四川省地震局和成都地震台增加了IPv4/v6双协议路由器,分别接入本地IPv4网络,通过隧道封装技术,由四川省地震局汇接成都地震台,再上联到中国地震台网中心,从而实现地震信息 IPv6网络的互联互通。

  16. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  17. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  18. Protocols for Robotic Telescope Networks

    Directory of Open Access Journals (Sweden)

    Alain Klotz

    2010-01-01

    This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP.

  19. MANETs performance analysis with dos attack at different routing protocols

    Directory of Open Access Journals (Sweden)

    Alaa Zain

    2015-05-01

    Full Text Available A Mobile Ad-Hoc Networks (MANET is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV, Hybrid routing protocols like Geographic Routing Protocol (GRP. Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.

  20. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  1. A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Directory of Open Access Journals (Sweden)

    Alfin Abraham

    2011-02-01

    Full Text Available Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet in a fair way, so that either each party gets the other’s signature, or neither party does. This paper, gives a survey on the most important fair and optimistic digital signature exchange protocols. Optimistic, means the third trusted party (TTP is involved only in the situations where one party is cheating or the communication channel is interrupted, i.e., TTP is offline. As more business is conducted over the Internet, the fair-exchange problem is gaining greater importance. This paper also provides an analysis of basic features, security, and efficiency of digital signature exchange protocols.

  2. An Efficient Protocol for Resource Constrained Platforms Using ECC

    Directory of Open Access Journals (Sweden)

    Mrs. S. Prasanna Ganesan

    2010-01-01

    Full Text Available At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography, are not appropriate for such devices due to their limitations in computing power, memory capacity, key sizes and cryptographic support. Therefore, an efficient protocol for resource constrained platforms that achieve a level of security similar to the one achieved by the protocols in use today is designed and implemented. This protocol is based solely on Elliptic curve asymmetric cryptography and the results prove that the performance achieved is good compared to RSA.

  3. DebtRank: too central to fail? Financial networks, the FED and systemic risk.

    Science.gov (United States)

    Battiston, Stefano; Puliga, Michelangelo; Kaushik, Rahul; Tasca, Paolo; Caldarelli, Guido

    2012-01-01

    Systemic risk, here meant as the risk of default of a large portion of the financial system, depends on the network of financial exposures among institutions. However, there is no widely accepted methodology to determine the systemically important nodes in a network. To fill this gap, we introduce, DebtRank, a novel measure of systemic impact inspired by feedback-centrality. As an application, we analyse a new and unique dataset on the USD 1.2 trillion FED emergency loans program to global financial institutions during 2008-2010. We find that a group of 22 institutions, which received most of the funds, form a strongly connected graph where each of the nodes becomes systemically important at the peak of the crisis. Moreover, a systemic default could have been triggered even by small dispersed shocks. The results suggest that the debate on too-big-to-fail institutions should include the even more serious issue of too-central-to-fail.

  4. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nishi Sharma

    2013-07-01

    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  5. Internet voting protocol based on implicit data security

    CERN Document Server

    Parakh, Abhishek

    2010-01-01

    This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

  6. OLSR Protocol Behavior Based on H.264 Multiservice Traffic

    Directory of Open Access Journals (Sweden)

    Mohamed Amnai

    2012-10-01

    Full Text Available Mobile Ad-Hoc network is a collection of mobile nodes in communication without using any fixed infrastructure. As the multiservice traffic compressors used today's grows, we need to verify if the available protocols support their applications. Therefore, in this paper we have studied the impact of multiservice traffic (MPEG-4, H.264 on the performances of Optimized Link State Protocol (OLSR protocol. The analysis has been done according to End-to-End Delay, Throughput and Packet Delivery ratio performance metrics. We discovered that the traffic type has huge impact on the OLSR performances

  7. Organization Theory: Bright Prospects for a Permanently Failing Field

    NARCIS (Netherlands)

    P.P.M.A.R. Heugens (Pursey)

    2008-01-01

    textabstractOrganization theory is a paradoxical field of scientific inquiry. It has struggled for more than fifty years to develop a unified theory of organizational effectiveness under girded by a coherent set of assumptions, and it has thus far failed to produce one. Yet, by other standards it is

  8. When Consensus Decision-Making Fails: A Case Study.

    Science.gov (United States)

    Savage, Grant T.

    Habermas's theory of dialogue was used to evaluate the process of decision making that occurred in a labor-management committee's meeting to discuss flextime. The study attempted to determine why, at that meeting, the committee's consensus process of decision making failed. W.R. Bion's theory of unconscious group motives was also used to…

  9. The ugly twins: failed global sourcing projects and their substitutes

    NARCIS (Netherlands)

    Schiele, Holger; Horn, Philipp; Werner, Welf

    2010-01-01

    Purpose of the paper and literature addressed: Analyzing the impact of failed global sourcing projects on the entire commodity group and exploring isomorphism as potential antecedent to the observed phenomenon. The paper is embedded in the global sourcing literature, as well as isomorphism and total

  10. "Badminton Player-Coach" Interactions between Failing Students

    Science.gov (United States)

    Mascret, Nicolas

    2011-01-01

    Background: Physical education teachers often use the player-coach dyad in individual opposition sports so that students can obtain information on their actions and then better regulate them. This type of work also develops methodological and social skills. However, the task of observing a partner often poses problems for failing students, who…

  11. 75 FR 76262 - Source of Income From Qualified Fails Charges

    Science.gov (United States)

    2010-12-08

    ... 881, which generally require gross-basis taxation of foreign persons not otherwise subject to U.S. net.... source income of foreign persons that is not effectively connected with the conduct of a trade or... qualified fails charge is generally determined by reference to the residence of the taxpayer that is...

  12. Evidence of a "Failing Newspaper" under the Newspaper Preservation Act.

    Science.gov (United States)

    Picard, Robert G.

    The Newspaper Preservation Act of 1970 makes it possible for competing newspapers to combine advertising, production, circulation and management functions into a single newspaper corporation. For the attorney general and the courts to authorize a joint operating agreement (JOA) for a "failing newspaper," certain conditions must be met and certain…

  13. Hip arthroplasty for failed treatment of proximal femoral fractures.

    Science.gov (United States)

    D'Arrigo, Carmelo; Perugia, Dario; Carcangiu, Alessandro; Monaco, Edoardo; Speranza, Attilio; Ferretti, Andrea

    2010-10-01

    Failed treatment of an intertrochanteric fracture typically leads to profound functional disability and pain. Salvage treatment with hip arthroplasty may be considered. The aim of this study was to evaluate the results and complications of hip arthroplasty performed as a salvage procedure after the failed treatment of an intertrochanteric hip fracture. Twenty-one patients were treated in our hospital with hip arthroplasty for failed treatment of intertrochanteric hip fracture. There were sixteen women and five men with a mean age of 75.8 years (range 61-85 years). Fourteen patients had failure of a previous nail fixation procedure, five had failure of a plate fixation, one of hip screws fixation and one of Ender nail fixation. In 19 out of 21 patients we performed a total hip arthroplasty-14 cases used modular implants with long-stems and five cases used a standard straight stem. In 2 of 21 cases we used a bipolar hemiarthroplasty. A statistically significant improvement was found comparing pre and postoperative conditions (p < 0.05). Our experience confirms that total hip arthroplasty is a satisfactory salvage procedure after failed treatment of an intertrochanteric fracture in elderly patients with few serious orthopaedic complications and acceptable clinical outcomes. PMID:19572131

  14. Why Young People Fail To Get and Hold Jobs.

    Science.gov (United States)

    New York State Dept. of Labor, Albany.

    This booklet provides advice to young people seeking their first jobs on how to avoid the pitfalls that have caused others to lose jobs or fail to be hired. Topics discussed in short, one-page sections include appearance, attitude and behavior, ignorance of labor market facts, misrepresentation, sensitivity about a physical defect, unrealistic…

  15. Establishing Pass/Fail Criteria for Bronchoscopy Performance

    DEFF Research Database (Denmark)

    Konge, Lars; Clementsen, Paul; Larsen, Klaus Richter;

    2012-01-01

    Background: Several tools have been created to assess competence in bronchoscopy. However, educational guidelines still use an arbitrary number of performed procedures to decide when basic competency is acquired. Objectives: The purpose of this study was to define pass/fail scores for two...

  16. Age of failed restorations: A deceptive longevity parameter

    NARCIS (Netherlands)

    Opdam, N.J.M.; Bronkhorst, E.M.; Cenci, M.S.; Huysmans, M.C.D.N.J.M.; Wilson, N.H.F.

    2011-01-01

    There is pressing need to enhance evidence base in respect of longevity of restorations. Currently, there is lack of appreciation of differences between survival data based on the age of failed restorations as compared to gold standard Kaplan-Meier statistics. OBJECTIVES: This study was undertaken t

  17. Ballooning osteolysis in 71 failed total ankle arthroplasties.

    Science.gov (United States)

    Singh, Gurpal; Reichard, Theresa; Hameister, Rita; Awiszus, Friedemann; Schenk, Katja; Feuerstein, Bernd; Roessner, Albert; Lohmann, Christoph

    2016-08-01

    Background and purpose - Aseptic loosening is a major cause of failure in total ankle arthroplasty (TAA). In contrast to other total joint replacements, large periarticular cysts (ballooning osteolysis) have frequently been observed in this context. We investigated periprosthetic tissue responses in failed TAA, and performed an element analysis of retrieved tissues in failed TAA. Patients and methods - The study cohort consisted of 71 patients undergoing revision surgery for failed TAA, all with hydroxyapatite-coated implants. In addition, 5 patients undergoing primary TAA served as a control group. Radiologically, patients were classified into those with ballooning osteolysis and those without, according to defined criteria. Histomorphometric, immunohistochemical, and elemental analysis of tissues was performed. Von Kossa staining and digital microscopy was performed on all tissue samples. Results - Patients without ballooning osteolysis showed a generally higher expression of lymphocytes, and CD3+, CD11c+, CD20+, and CD68+ cells in a perivascular distribution, compared to diffuse expression. The odds of having ballooning osteolysis was 300 times higher in patients with calcium content >0.5 mg/g in periprosthetic tissue than in patients with calcium content ≤0.5 mg/g (p < 0.001). Interpretation - There have been very few studies investigating the pathomechanisms of failed TAA and the cause-effect nature of ballooning osteolysis in this context. Our data suggest that the hydroxyapatite coating of the implant may be a contributory factor.

  18. An Improved Directed Diffusion Protocol based on Opportunistic Routing

    OpenAIRE

    Yi Xu; Yixian Yang; Yang Xin; Hongliang Zhu

    2014-01-01

    Researchers are paying more and more attention to the application of wireless sensor networks (WSNs), where routing is one of the vital techniques. An advanced Directed Diffusion protocol, named DDOR, is presented in this paper based on Opportunistic Routing to improve the disadvantage of mono-forwarder of traditional routing protocol. Packet head has been modified in order to implement a forwarder list in DDOR. Instead of fixed next-hop forwarding in transmission, DDOR selects the optimal no...

  19. Server-side verification of client behavior in cryptographic protocols

    OpenAIRE

    Chi, Andrew; Cochran, Robert; Nesfield, Marie; Reiter, Michael K.; Sturton, Cynthia

    2016-01-01

    Numerous exploits of client-server protocols and applications involve modifying clients to behave in ways that untampered clients would not, such as crafting malicious packets. In this paper, we demonstrate practical verification of a cryptographic protocol client's messaging behavior as being consistent with the client program it is believed to be running. Moreover, we accomplish this without modifying the client in any way, and without knowing all of the client-side inputs driving its behav...

  20. SECURE SHORT MESSAGE PEER-TO-PEER PROTOCOL

    OpenAIRE

    Saurabh Samanta; Radhesh Mohandas; Alwyn R. Pais

    2012-01-01

    Short Message Service (SMS) has become an extension of our lives and plays an important role in daily chores. SMS is a popular medium for delivering Value Added Services and are suitable for mobile banking, payment reminders, SOS calls, stock and news alerts, railway and flight enquiries etc. These types of messages are normally computer generated messages sent over Short Message Peer-to-Peer (SMPP) protocol. SMPP is an application layer protocol to send messages over TCP/IP connection. SMPP ...