WorldWideScience

Sample records for application protocol initial

  1. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  2. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  3. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  4. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  5. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  6. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  7. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  8. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  9. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  10. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  11. A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction

    Directory of Open Access Journals (Sweden)

    Rajaa Filali

    2014-01-01

    Full Text Available The Session Initiation Protocol (SIP is an application layer signaling protocol used to create, manage, and terminate sessions in an IP based network. SIP is considered as a transactional protocol. There are two main SIP transactions, the INVITE transaction and the non-INVITE transaction. The SIP INVITE transaction specification is described in an informal way in Request for Comments (RFC 3261 and modified in RFC 6026. In this paper we focus on the INVITE transaction of SIP, over reliable and unreliable transport mediums, which is used to initiate a session. In order to ensure the correctness of SIP, the INVITE transaction is modeled and verified using event-B method and its Rodin platform. The Event-B refinement concept allows an incremental development by defining the studied system at different levels of abstraction, and Rodin discharges almost all proof obligations at each level. This interaction between modeling and proving reduces the complexity and helps in assuring that the INVITE transaction SIP specification is correct, unambiguous, and easy to understand.

  12. Peer-to-peer session initiation protocol in highly volatile environments

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Roper, I.; Morphett, J.

    2008-01-01

    The session initiation protocol (SIP) is an IETF standardised protocol for multimedia signalling and communication over the internet. SIP has been used in many deployments in client-server architecture. However, this configuration potentially possesses various scalability and redundancy limitations

  13. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    Science.gov (United States)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  14. Closed Conference Signalling Using the Session Initiation Protocol.

    Science.gov (United States)

    Miladinovic, Igor; Stadler, Johannes

    2003-01-01

    Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…

  15. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  16. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  17. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  18. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  19. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  20. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  1. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  2. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  3. A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks

    Science.gov (United States)

    2001-01-01

    00-00-2001 to 00-00-2001 4. TITLE AND SUBTITLE A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Netowrks 5a. CONTRACT NUMBER...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE

  4. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  5. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  6. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    Science.gov (United States)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  7. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically

  8. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    Moeller, S; Newe, T; Lochmann, S

    2009-01-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  9. Application Framework with Abstractions for Protocol and Agent Role

    DEFF Research Database (Denmark)

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent ...... roles are supported by a simple and expressive application framework....

  10. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...

  11. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    OpenAIRE

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  12. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  13. A protocol for the retina surgeon's safe initial intravitreal injections.

    Science.gov (United States)

    Frenkel, Ronald E P; Haji, Shamim A; La, Melvin; Frenkel, Max P C; Reyes, Angela

    2010-11-10

    To determine the safety of a surgeon's initial consecutive intravitreal injections using a specific protocol and to review the complications that may be attributed to the injection procedure. A retrospective chart review. Fifty-nine patients (30 females, 29 males) received intravitreal injections of pegaptanib, bevacizumab, or ranibizumab as part of their treatment for neovascular age-related macular degeneration. The average patient age was 80 years. Twenty-two patients were diagnosed with or suspected of having glaucoma. Each patient received an average of 5.8 injections. The charts of 59 patients who received a total of 345 intravitreal injections (104 pegaptanib, 74 bevacizumab, 167 ranibizumab) were reviewed. All injections were performed in an office-based setting. Povidone-iodine, topical antibiotics, and eye speculum were used as part of the pre injection procedure. Vision and intraocular pressure were evaluated immediately following each injection. Incidence of post injection complications, including but not limited to endophthalmitis, retinal detachment, traumatic cataract, and vitreous hemorrhage. There were no cases of endophthalmitis, toxic reactions, traumatic cataracts, retinal detachment, or vitreous hemorrhage. There was one case each of lid swelling, transient floaters, retinal pigment epithelial tear, corneal edema, and corneal abrasion. There were five cases of transient no light perception following pegaptanib injections. The incidence of serious complications was very low for the intravitreal injections given. A surgeon's initial intravitreal injections may be performed with a very high degree of safety using this protocol.

  14. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  15. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  16. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  17. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  18. Influence of Whitening Gel Application Protocol on Dental Color Change

    Directory of Open Access Journals (Sweden)

    Taciana Marco Ferraz Caneppele

    2015-01-01

    Full Text Available Objectives. To evaluate the influence of different whitening protocols on the efficacy of 35% hydrogen peroxide (HP tooth whitening and gel pH and concentration. Material and Methods. Eighty-four enamel/dentin discs from bovine incisors were used. The baseline color was measured with a spectrophotometer. Two sessions of in-office whitening with 35% HP were performed under different protocols: G1: 3 applications of HP (10 min each per session; G2: 1 application of 30 min per session; G3: 1 application of 40 min per session, with no gel replenishment within session for groups 2 and 3. HP titration and pH evaluation at baseline, after 10, 30, and 40 min were also performed. The final color was measured 24 h after the 1st and 2nd whitening sessions. Data were submitted to Repeated Measures ANOVA and Tukey’s test. Results. For color evaluation, no differences were observed among groups after two sessions. HP titration showed no drop on concentration after 10, 30, or 40 min. The pH was 5.54 at baseline and 5.41 after 40 min. Conclusion. Replenishment or extended application time of in-office whitening gel does not affect gel pH and concentration, a fact that supports the similar effectiveness of whitening observed among the tested protocols.

  19. Application of Protocol-Oriented MVVM Architecture in iOS Development

    OpenAIRE

    Luong Nguyen, Khoi Nguyen

    2017-01-01

    The mobile application industry is fast paced. Requirements change, additions of new features occur on a daily basis and demand frequent code structure adjustment. Thus, a flexible and maintainable software architecture is often a key factor for an application’s success. The major objective of this thesis is to propose a practical use case of Protocol Oriented Model View View Model, an architecture inspired by the Protocol Oriented Programming paradigm. This thesis explains the architectur...

  20. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  1. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  2. Modelling a New Product Model on the Basis of an Existing STEP Application Protocol

    Directory of Open Access Journals (Sweden)

    B.-R. Hoehn

    2005-01-01

    Full Text Available During the last years a great range of computer aided tools has been generated to support the development process of various products. The goal of a continuous data flow, needed for high efficiency, requires powerful standards for the data exchange. At the FZG (Gear Research Centre of the Technical University of Munich there was a need for a common gear data format for data exchange between gear calculation programs. The STEP standard ISO 10303 was developed for this type of purpose, but a suitable definition of gear data was still missing, even in the Application Protocol AP 214, developed for the design process in the automotive industry. The creation of a new STEP Application Protocol or the extension of existing protocol would be a very time consumpting normative process. So a new method was introduced by FZG. Some very general definitions of an Application Protocol (here AP 214 were used to determine rules for an exact specification of the required kind of data. In this case a product model for gear units was defined based on elements of the AP 214. Therefore no change of the Application Protocol is necessary. Meanwhile the product model for gear units has been published as a VDMA paper and successfully introduced for data exchange within the German gear industry associated with FVA (German Research Organisation for Gears and Transmissions. This method can also be adopted for other applications not yet sufficiently defined by STEP. 

  3. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  4. Long-term outcome of intensive initial immunosuppression protocol in pediatric deceased donor renal transplantation.

    LENUS (Irish Health Repository)

    Olaitan, Oyedolamu K

    2010-02-01

    To report the long-term outcome of deceased donor kidney transplantation in children with emphasis on the use of an intensive initial immunosuppression protocol using R-ATG as antibody induction. Between January 1991 and December 1997, 82 deceased donor kidney transplantations were performed in 75 pediatric recipients. Mean recipient age at transplantation was 12.9 yr and the mean follow-up period was 12.6 yr. All patients received quadruple immunosuppression with steroid, cyclosporine, azathioprine, and antibody induction using R-ATG-Fresenius. Actual one, five, and 10 yr patient survival rates were 99%, 97%, and 94%, respectively; only one patient (1.2%) developed PTLD. Actual one, five, and 10 yr overall graft survival rates were 84%, 71%, and 50%, respectively; there were five cases (6%) of graft thrombosis and the actual immunological graft survival rates were 91%, 78%, and 63% at one, five, and 10 yr, respectively. The use of an intensive initial immunosuppression protocol with R-ATG as antibody induction is safe and effective in pediatric recipients of deceased donor kidneys with excellent immunological graft survival without an increase in PTLD or other neoplasms over a minimum 10-yr follow up.

  5. Electrical Stimulation of Coleopteran Muscle for Initiating Flight.

    Directory of Open Access Journals (Sweden)

    Hao Yu Choo

    Full Text Available Some researchers have long been interested in reconstructing natural insects into steerable robots or vehicles. However, until recently, these so-called cyborg insects, biobots, or living machines existed only in science fiction. Owing to recent advances in nano/micro manufacturing, data processing, and anatomical and physiological biology, we can now stimulate living insects to induce user-desired motor actions and behaviors. To improve the practicality and applicability of airborne cyborg insects, a reliable and controllable flight initiation protocol is required. This study demonstrates an electrical stimulation protocol that initiates flight in a beetle (Mecynorrhina torquata, Coleoptera. A reliable stimulation protocol was determined by analyzing a pair of dorsal longitudinal muscles (DLMs, flight muscles that oscillate the wings. DLM stimulation has achieved with a high success rate (> 90%, rapid response time (< 1.0 s, and small variation (< 0.33 s; indicating little habituation. Notably, the stimulation of DLMs caused no crucial damage to the free flight ability. In contrast, stimulation of optic lobes, which was earlier demonstrated as a successful flight initiation protocol, destabilized the beetle in flight. Thus, DLM stimulation is a promising secure protocol for inducing flight in cyborg insects or biobots.

  6. Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Orfanidis, Charalampos; Dragoni, Nicola

    2014-01-01

    In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. In the case of multiple senders having traffic for a given receiver, such beacons form...... points where collisions are likely to happen. In this paper, we present altruistic backoff (AB), a novel collision avoidance mechanism that aims to avoid collisions before the transmission of a beacon. As a result of an early backoff, senders spend less time in idle listening waiting for a beacon, thus...... saving significant amounts of energy. We present an implementation of AB for Texas Instruments' eZ430-rf2500 sensor nodes and we evaluate its performance with simulations and experiments....

  7. Application of QC_DR software for acceptance testing and routine quality control of direct digital radiography systems: initial experiences using the Italian Association of Physicist in Medicine quality control protocol.

    Science.gov (United States)

    Nitrosi, Andrea; Bertolini, Marco; Borasi, Giovanni; Botti, Andrea; Barani, Adriana; Rivetti, Stefano; Pierotti, Luisa

    2009-12-01

    Ideally, medical x-ray imaging systems should be designed to deliver maximum image quality at an acceptable radiation risk to the patient. Quality assurance procedures are employed to ensure that these standards are maintained. A quality control protocol for direct digital radiography (DDR) systems is described and discussed. Software to automatically process and analyze the required images was developed. In this paper, the initial results obtained on equipment of different DDR manufacturers were reported. The protocol was developed to highlight even small discrepancies in standard operating performance.

  8. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  9. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  10. A protocol for the retina surgeon’s safe initial intravitreal injections

    Directory of Open Access Journals (Sweden)

    Ronald EP Frenkel

    2010-11-01

    Full Text Available Ronald EP Frenkel1,2, Shamim A Haji1,2, Melvin La1, Max PC Frenkel1, Angela Reyes11Eye Research Foundation, Stuart, FL, USA; 2East Florida Eye Institute, Stuart, FL, USAPurpose: To determine the safety of a surgeon’s initial consecutive intravitreal injections using a specific protocol and to review the complications that may be attributed to the injection procedure.Design: A retrospective chart review.Participants: Fifty-nine patients (30 females, 29 males received intravitreal injections of pegaptanib, bevacizumab, or ranibizumab as part of their treatment for neovascular age-related macular degeneration. The average patient age was 80 years. Twenty-two patients were diagnosed with or suspected of having glaucoma. Each patient received an average of 5.8 injections.Methods: The charts of 59 patients who received a total of 345 intravitreal injections (104 pegaptanib, 74 bevacizumab, 167 ranibizumab were reviewed. All injections were performed in an office-based setting. Povidone–iodine, topical antibiotics, and eye speculum were used as part of the pre injection procedure. Vision and intraocular pressure were evaluated immediately following each injection.Main outcome measures: Incidence of post injection complications, including but not limited to endophthalmitis, retinal detachment, traumatic cataract, and vitreous hemorrhage.Results: There were no cases of endophthalmitis, toxic reactions, traumatic cataracts, retinal detachment, or vitreous hemorrhage. There was one case each of lid swelling, transient floaters, retinal pigment epithelial tear, corneal edema, and corneal abrasion. There were five cases of transient no light perception following pegaptanib injections.Conclusion: The incidence of serious complications was very low for the intravitreal injections given. A surgeon’s initial intravitreal injections may be performed with a very high degree of safety using this protocol.Keywords: intravitreal injection, post injection

  11. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  12. Electrical Stimulation of Coleopteran Muscle for Initiating Flight.

    Science.gov (United States)

    Choo, Hao Yu; Li, Yao; Cao, Feng; Sato, Hirotaka

    2016-01-01

    Some researchers have long been interested in reconstructing natural insects into steerable robots or vehicles. However, until recently, these so-called cyborg insects, biobots, or living machines existed only in science fiction. Owing to recent advances in nano/micro manufacturing, data processing, and anatomical and physiological biology, we can now stimulate living insects to induce user-desired motor actions and behaviors. To improve the practicality and applicability of airborne cyborg insects, a reliable and controllable flight initiation protocol is required. This study demonstrates an electrical stimulation protocol that initiates flight in a beetle (Mecynorrhina torquata, Coleoptera). A reliable stimulation protocol was determined by analyzing a pair of dorsal longitudinal muscles (DLMs), flight muscles that oscillate the wings. DLM stimulation has achieved with a high success rate (> 90%), rapid response time (cyborg insects or biobots.

  13. A nurse-initiated pain protocol in the ED improves pain treatment in patients with acute musculoskeletal pain

    NARCIS (Netherlands)

    Pierik, Jorien; Berben, Sivera A.; IJzerman, Maarten Joost; Gaakeer, Menno I.; Eenennaam, Fred L.; van Vugt, Arie B.; Doggen, Catharina Jacoba Maria

    2016-01-01

    While acute musculoskeletal pain is a frequent complaint, its management is often neglected. An implementation of a nurse-initiated pain protocol based on the algorithm of a Dutch pain management guideline in the emergency department might improve this. A pre–post intervention study was performed as

  14. A nurse-initiated pain protocol in the ED improves pain treatment in patients with acute musculoskeletal pain

    NARCIS (Netherlands)

    Pierik, J.G.; Berben, S.A.A.; IJzerman, M.J.; Gaakeer, M.I.; Eenennaam, F.L. van; Vugt, A.B. van; Doggen, C.J.

    2016-01-01

    While acute musculoskeletal pain is a frequent complaint, its management is often neglected. An implementation of a nurse-initiated pain protocol based on the algorithm of a Dutch pain management guideline in the emergency department might improve this. A pre-post intervention study was performed as

  15. Evaluation of quality improvement initiative in pediatric oncology: implementation of aggressive hydration protocol.

    Science.gov (United States)

    Fratino, Lisa M; Daniel, Denise A; Cohen, Kenneth J; Chen, Allen R

    2009-01-01

    Our goal was to improve the efficiency of chemotherapy administration for pediatric oncology patients. We identified prechemotherapy hydration as the process that most often delayed chemotherapy administration. An aggressive hydration protocol, supported by fluid order sets, was developed for patients receiving planned chemotherapy. The mean interval from admission to achieving adequate hydration status was reduced significantly from 4.9 to 1.4 hours with a minor reduction in the time to initiate chemotherapy from 9.6 to 8.6 hours. Chemotherapy availability became the new rate-limiting process.

  16. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  17. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  18. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  19. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  20. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  1. Uma aplicação de voz sobre IP baseada no Session Initiation Protocol

    OpenAIRE

    Maia da Silva Junior, Jucimar

    2006-01-01

    Neste trabalho é implementada uma aplicação de Voz Sobre IP utilizando o Session Initiation Protocol (SIP) como protocolo de sinalização. Para alcançar este objetivo, são analisadas algumas tecnologias importantes, como os protocolos da Internet Engineering Task Force (IETF) para Telefonia IP, codificadores de voz, e a utilização da aplicação para verificação de atrasos, jitter e perda de pacotes. A aplicação foi desenvolvida em Java e pode facilmente ser modificada para adequa...

  2. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  3. Initiating Events Modeling for On-Line Risk Monitoring Application

    International Nuclear Information System (INIS)

    Simic, Z.; Mikulicic, V.

    1998-01-01

    In order to make on-line risk monitoring application of Probabilistic Risk Assessment more complete and realistic, a special attention need to be dedicated to initiating events modeling. Two different issues are of special importance: one is how to model initiating events frequency according to current plant configuration (equipment alignment and out of service status) and operating condition (weather and various activities), and the second is how to preserve dependencies between initiating events model and rest of PRA model. First, the paper will discuss how initiating events can be treated in on-line risk monitoring application. Second, practical example of initiating events modeling in EPRI's Equipment Out of Service on-line monitoring tool will be presented. Gains from application and possible improvements will be discussed in conclusion. (author)

  4. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  5. The Application of RPL Routing Protocol in Low Power Wireless Sensor and Lossy Networks

    Directory of Open Access Journals (Sweden)

    Xun Yang

    2014-05-01

    Full Text Available With the continuous development of computer information technology, wireless sensor has been successfully changed the mode of human life, at the same time, as one of the technologies continues to improve the future life, how to better integration with the RPL routing protocols together become one of research focuses in the current climate. This paper start from the wireless sensor network, briefly discusses the concept, followed by systematic exposition of RPL routing protocol developed background, relevant standards, working principle, topology and related terms, and finally explore the RPL routing protocol in wireless sensor low power lossy network applications.

  6. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  7. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  8. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience

    Energy Technology Data Exchange (ETDEWEB)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang [The First Affiliated Hospital of Zhengzhou University, Department of Radiology, Zhengzhou, Henan Province (China)

    2017-01-15

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80) each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. (orig.)

  9. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience

    International Nuclear Information System (INIS)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80) each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. (orig.)

  10. Nuclear liability: Joint protocol relating to the application of the Vienna Convention and the Paris Convention, 1988

    International Nuclear Information System (INIS)

    1989-10-01

    The Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met in Vienna, at the Headquarters of the International Atomic Energy Agency on 21 September 1988. The Joint Protocol establishes a link between the Paris Convention on Third Party Liability in the Field of Nuclear Energy of 1960 and the Vienna Convention on Civil Liability for Nuclear Damage of 1963. The Joint Protocol will extend to the States adhering to it the coverage of the two Conventions. It will also resolve potential conflicts of law, which could result from the simultaneous application of the two Conventions to the same nuclear accident. The Conference on the Relationship between the Paris Convention and the Vienna Convention was jointly organized by the International Atomic Energy Agency and the OECD Nuclear Energy Agency. This publication contains the text of the Final Act of the Conference in the six authentic languages, the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention, also in the six authentic languages and an explanatory note, prepared by the IAEA and NEA Secretariats, providing background information on the content of the Joint Protocol

  11. Remote control of the industry processes. POWERLINK protocol application

    Science.gov (United States)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  12. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience.

    Science.gov (United States)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80 each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. • Automatic spectral imaging protocol selection provides appropriate scan protocols. • Abdominal CT is feasible using spectral imaging and 300 mgI/kg contrast agent. • 50-keV monochromatic images with 50 % ASIR provide optimal image quality.

  13. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  14. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  15. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  16. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  17. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  18. Biological quarantine on international waters: an initiative for onboard protocols

    Science.gov (United States)

    Takano, Yoshinori; Yano, Hajime; Funase, Ryu; Sekine, Yasuhito; Takai, Ken

    2012-07-01

    The research vessel Chikyu is expanding new frontiers in science, technology, and international collaboration through deep-sea expedition. The Chikyu (length: 210 m, gross tonnage: 56752 tons) has advanced and comprehensive scientific research facilities. One of the scientific purposes of the vessel is to investigate into unexplored biosphere (i.e., undescribed extremophiles) on the Earth. Therefore, "the onboard laboratory" provides us systematic microbiological protocols with a physical containment situation. In parallel, the onboard equipments provide sufficient space for fifty scientists and technical support staff. The helicopter deck also supports various logistics through transporting by a large scale helicopter (See, http://www.jamstec.go.jp/chikyu/eng/). Since the establishment of Panel on Planetary Protection (PPP) in Committee on Space Research (COSPAR), we have an international consensus about the development and promulgation of planetary protection knowledge, policy, and plans to prevent the harmful effects of biological contamination on the Earth (e.g., Rummel, 2002). However, the matter to select a candidate location of initial quarantine at BSL4 level is often problematic. To answer the key issue, we suggest that international waters can be a meaningful option with several advantages to conduct initial onboard-biological quarantine investigation. Hence, the research vessel Chikyu is promising for further PPP requirements (e.g., Enceladus sample return project: Tsou et al., 2012). Rummel, J., Seeking an international consensus in planetary protection: COSPAR's planetary protection panel. Advances in Space Research, 30, 1573-1575 (2002). Tsou, P. et al. LIFE: Life Investigation For Enceladus - A Sample Return Mission Concept in Search for Evidence of Life. Astrobiology, in press.

  19. A Distance Bounding Protocol for Location-Cloaked Applications.

    Science.gov (United States)

    Molina-Martínez, Cristián; Galdames, Patricio; Duran-Faundez, Cristian

    2018-04-26

    Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP)—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier) may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover). However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation.

  20. A Distance Bounding Protocol for Location-Cloaked Applications

    Directory of Open Access Journals (Sweden)

    Cristián Molina-Martínez

    2018-04-01

    Full Text Available Location-based services (LBSs assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover. However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation.

  1. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  2. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    OpenAIRE

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the protocol-centred paradigm. We argue that interaction systems that support application-level interactions should be explicitly designed, using the externally observable behaviour of the interaction ...

  3. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  4. Implementation Intention for Initiating Intuitive Eating and Active Embodiment in Obese Patients Using a Smartphone Application

    Directory of Open Access Journals (Sweden)

    Damien Brevers

    2017-11-01

    Full Text Available This article describes a study protocol, which aims to explore and describe the feasibility of a mobile-phone application for initiating intuitive eating and intuitive exercising in patients who are following an ambulatory treatment for obesity. Intuitive eating refers to one’s ability to make food choices based on one’s awareness of his/her body’s response. Intuitive exercising encourages people in finding enjoyable ways of being physically active. These two components will be trained using an implementation intention procedure, that is, behavioral plans that aim at creating a strong link between a specified situation and a response. We aim to recruit up to 80 overweight and obese patients over a period of 2 years. The smartphone application will be assessed on the basis of (i data obtained through a 4-week use period, (ii self-report measures taken before and after the use of the mobile application, and (iii feedbacks from participants after the use of the mobile application. This pilot study will allow us to better understand the applicability of the use of mobile application within ambulatory treatment settings, and to adapt the design of the app necessary for building cross-sectional studies investigating its efficacy.

  5. Application of a topical vapocoolant spray decreases pain at the site of initial intradermal anaesthetic injection during ultrasound-guided breast needle biopsy

    International Nuclear Information System (INIS)

    Collado-Mesa, F.; Net, J.M.; Arheart, K.; Klevos, G.A.; Yepes, M.M.

    2015-01-01

    Aim: To assess whether the application of a topical vapocoolant spray immediately prior to initial intradermal anaesthetic injection during ultrasound-guided breast biopsy decreases pain at the site of the initial injection. Materials and methods: In this institutional review board-approved, Health Insurance Portability and Accountability Act (HIPAA)-compliant study, 50 women aged 49.1 ± 1.6 years (mean ± standard error) were recruited and provided written informed consent. Participants served as their own controls and were blinded as to whether a topical vapocoolant spray or a placebo was used immediately prior to the initial local anaesthetic injection at two separate biopsy sites. With the exception of the application of vapocoolant or placebo, the entire ultrasound-guided procedure was performed according to a routine protocol. Participants recorded pain at initial injection site on a visual analogue scale. General linear mixed models for repeated measures analysis of variance and a 0.05 significance level were used. Results: Application of topical vapocoolant spray was shown to significantly decrease pain at the site of initial intradermal anaesthetic injection as compared to placebo (p<0.001). Treatment effect was independent of age of the subject, race/ethnicity, operator, type of biopsy device, and histopathology result. No complications from vapocoolant spray use were reported. Conclusion: Application of a topical vapocoolant spray immediately prior to initial intradermal anaesthetic injection during ultrasound-guided breast biopsy significantly decreases pain at the site of the initial injection and could contribute to improve the patient's overall procedural experience. -- Highlights: •Topical vapocoolant spray decreased pain at site of initial anesthetic injection (

  6. Using the "Knowledge Quartet" to Quantify Mathematical Knowledge in Teaching: The Development of a Protocol for Initial Teacher Education

    Science.gov (United States)

    Weston, Tracy L.

    2013-01-01

    This study examined trainee teachers' mathematical knowledge in teaching (MKiT) over their final year in a US Initial Teacher Education (ITE) programme. This paper reports on an exploratory methodological approach taken to use the "Knowledge Quartet" to quantify MKiT through the development of a new protocol to code trainees' teaching of…

  7. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  8. The Use of Grid Storage Protocols for Healthcare Applications

    CERN Document Server

    Donno, F; CERN. Geneva. IT Department

    2008-01-01

    Grid computing has attracted worldwide attention for a variety of domains. Healthcare projects focus on data mining and standardization techniques, the issue of data accessibility and transparency over the storage systems on the Grid has seldom been tackled. In this position paper, we identify the key issues and requirements imposed by Healthcare applications and point out how Grid Storage Technology can be used to satisfy those requirements. The main contribution of this work is the identification of the characteristics and protocols that make Grid Storage technology attractive for building a Healthcare data storage infrastructure.

  9. Fast protocol for radiochromic film dosimetry using a cloud computing web application.

    Science.gov (United States)

    Calvo-Ortega, Juan-Francisco; Pozo, Miquel; Moragues, Sandra; Casals, Joan

    2017-07-01

    To investigate the feasibility of a fast protocol for radiochromic film dosimetry to verify intensity-modulated radiotherapy (IMRT) plans. EBT3 film dosimetry was conducted in this study using the triple-channel method implemented in the cloud computing application (Radiochromic.com). We described a fast protocol for radiochromic film dosimetry to obtain measurement results within 1h. Ten IMRT plans were delivered to evaluate the feasibility of the fast protocol. The dose distribution of the verification film was derived at 15, 30, 45min using the fast protocol and also at 24h after completing the irradiation. The four dose maps obtained per plan were compared using global and local gamma index (5%/3mm) with the calculated one by the treatment planning system. Gamma passing rates obtained for 15, 30 and 45min post-exposure were compared with those obtained after 24h. Small differences respect to the 24h protocol were found in the gamma passing rates obtained for films digitized at 15min (global: 99.6%±0.9% vs. 99.7%±0.5%; local: 96.3%±3.4% vs. 96.3%±3.8%), at 30min (global: 99.5%±0.9% vs. 99.7%±0.5%; local: 96.5%±3.2% vs. 96.3±3.8%) and at 45min (global: 99.2%±1.5% vs. 99.7%±0.5%; local: 96.1%±3.8% vs. 96.3±3.8%). The fast protocol permits dosimetric results within 1h when IMRT plans are verified, with similar results as those reported by the standard 24h protocol. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  10. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  11. The SHIP: A SIP to HTTP Interaction Protocol

    Science.gov (United States)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  12. Rancang Bangun Perangkat Lunak Billing dan Implementasi Voice Over Internet Protocol

    Directory of Open Access Journals (Sweden)

    Honni Honni

    2013-12-01

    Full Text Available The rapidly evolving communication system enables applications for telephone communication to be carried over the data network known as VoIP (voice over internet protocol. SIP (session initiation protocol as the signaling protocol is text-based VoIP which can be implemented easily in comparison with other signalingprotocols. The purpose of this paper is designing and implementing VoIP billing up to the company to provide additional facilities for enterprise customers. The methods start with data collection, analysis, design, development, and implementation. The result achieved is a system of VoIP with SIP and Asterisk software which has functions of PBX to provide additional facilities such as VoIP which is a plus for the company and customers. After implemented, the VoIP system and billing features are found work well.

  13. Development of a new Emergency Medicine Spinal Immobilization Protocol for trauma patients and a test of applicability by German emergency care providers.

    Science.gov (United States)

    Kreinest, Michael; Gliwitzky, Bernhard; Schüler, Svenja; Grützner, Paul A; Münzberg, Matthias

    2016-05-14

    In order to match the challenges of quickly recognizing and treating any life-threatening injuries, the ABCDE principles were established for the assessment and treatment of trauma patients. The high priority of spine protection is emphasized by the fact that immobilization of the cervical spine is performed at the very first step in the ABCDE principles. Immobilization is typically performed to prevent or minimize secondary damage to the spinal cord if instability of the spinal column is suspected. Due to increasing reports about disadvantages of spinal immobilization, the indications for performing spinal immobilization must be refined. The aim of this study was (i) to develop a protocol that supports decision-making for spinal immobilization in adult trauma patients and (ii) to carry out the first applicability test by emergency medical personnel. A structured literature search considering the literature from 1980 to 2014 was performed. Based on this literature and on the current guidelines, a new protocol that supports on scene decision-making for spinal immobilization has been developed. Parameters found in the literature concerning mechanisms and factors increasing the likelihood of spinal injury have been included in the new protocol. In order to test the applicability of the new protocol two surveys were performed on German emergency care providers by means of a questionnaire focused on correct decision-making if applying the protocol. Based on the current literature and guidelines, the Emergency Medicine Spinal Immobilization Protocol (E.M.S. IMMO Protocol) for adult trauma patients was developed. Following a fist applicability test involving 21 participants, the first version of the E.M.S. IMMO Protocol has to be graphically re-organized. A second applicability test comprised 50 participants with the current version of the protocol confirmed good applicability. Questions regarding immobilization of trauma patients could be answered properly using the E

  14. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Directory of Open Access Journals (Sweden)

    Alvaro Carvajal-Flórez

    2016-04-01

    Full Text Available ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS of the American Board of Orthodontics (ABO. Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG consisted of 17 patients (19.88 ± 4.4 years old treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old selected by stratified randomization without finishing intervention (CG. Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048, respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8 (p = 0.009 and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6 (p = 0.007. Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8 (p = 0.62 and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9 (p = 0.65. Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system.

  15. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  16. Stationary average consensus protocol for a class of heterogeneous high-order multi-agent systems with application for aircraft

    Science.gov (United States)

    Rezaei, Mohammad Hadi; Menhaj, Mohammad Bagher

    2018-01-01

    This paper investigates the stationary average consensus problem for a class of heterogeneous-order multi-agent systems. The goal is to bring the positions of agents to the average of their initial positions while letting the other states converge to zero. To this end, three different consensus protocols are proposed. First, based on the auxiliary variables information among the agents under switching directed networks and state-feedback control, a protocol is proposed whereby all the agents achieve stationary average consensus. In the second and third protocols, by resorting to only measurements of relative positions of neighbouring agents under fixed balanced directed networks, two control frameworks are presented with two strategies based on state-feedback and output-feedback control. Finally, simulation results are given to illustrate the effectiveness of the proposed protocols.

  17. Considerations preliminary to the application of early and immediate loading protocols in dental implantology.

    Science.gov (United States)

    Szmukler-Moncler, S; Piattelli, A; Favero, G A; Dubruille, J H

    2000-02-01

    In oral implantology, a 3-6 month stress-free healing period is presently accepted as a prerequisite to achieve bone apposition without interposition of a fibrous scar tissue. This protocol was introduced by Brånemark and co-workers in 1977. The aim of the present paper is to review the reasons that led Brånemark and collaborators to require long delayed loading periods. It is shown that the requirement for long delayed loading periods was drawn from the initiation and development periods of their original clinical trial. Demanding conditions were met involving simultaneously: 1) patients with poor bone quality and quantity, 2) non-optimized implant design, 3) short implants, 4) non-optimized surgical placement, 5) non-optimized surgical protocol and 6) biomechanically non-optimized prosthesis. Extrapolation of the requirement for long healing periods from these particular conditions to more standard situations involving refined surgical protocols and careful patient selection might be questioned. Albeit premature loading has been interpreted as inducing fibrous tissue interposition, immediate loading per se is not responsible for fibrous encapsulation. It is the excess of micromotion during the healing phase that interferes with bone repair. A threshold of tolerated micromotion exists, that is somewhere between 50 microns and 150 microns. It is suggested that loading protocols might be shortened through 2 different approaches. The first way would be to decrease stepwise the delayed loading period for free-standing implants below the presently accepted 3-6 months of healing. The second way would be to identify immediate loading protocols that are capable of keeping the amount of micromotion beneath the threshold of deleterious micromotion. Immediate loading protocols for implants-retained overdentures and fixed bridges are reviewed. It is shown that successful premature loading protocols require a careful and strict patient selection aimed to achieve the best

  18. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  19. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  1. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  2. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  3. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  4. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  5. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  6. Characterisation of immune responses in healthy foals when a multivalent vaccine protocol was initiated at age 90 or 180 days.

    Science.gov (United States)

    Davis, E G; Bello, N M; Bryan, A J; Hankins, K; Wilkerson, M

    2015-11-01

    Protection from infectious disease requires antigen-specific immunity. In foals, most vaccine protocols are delayed until 6 months to avoid maternal antibody interference. Susceptibility to disease may exist prior to administration of vaccination at age 4-6 months. The aim of this investigation was to characterise immune activation among healthy foals in response to a multivalent vaccine protocol and compare immune responses when foals were vaccinated at age either 90 or 180 days. Randomised block design. Twelve healthy foals with colostral transfer were blocked for age and randomly assigned to vaccination at age 90 days (treatment) or at age 180 days (control). Vaccination protocols included a 3-dose series and booster vaccine administered at age 11 months. Immune response following vaccination at age 90 or 180 days was comparable for several measures of cellular immunity. Antigen specific CD4+ and CD8+ expression of interleukin-4, interferon-γ and granzyme B to eastern equine encephalomyelitis, western equine encephalomyelitis, West Nile virus, tetanus toxoid, equine influenza and equine herpesvirus-1/4 antigens were evident for both groups 30 days after initial vaccine and at age 344 days. Both groups showed a significant increase in antigen-specific immunoglobulin G expression following booster vaccine at age 11 months, thereby indicating memory immune responses. The data presented in this report demonstrate that young foals are capable of immune activation following a 3-dose series with a multivalent vaccine, despite presence of maternal antibodies. Although immune activation does not automatically confer protection, several of the immune indicators measured showed comparable expression in foals vaccinated at 3 months relative to control foals vaccinated at age 6 months. In high-risk situations where immunity may be required earlier than following a conventional vaccine series, our data provide evidence that foals respond to immunisation initiated at 3 months

  7. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    DEFF Research Database (Denmark)

    Burgy, Laurent; Reveillere, Laurent; Lawall, Julia Laetitia

    2007-01-01

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain...

  8. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  9. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  10. FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue are available here.   Human Resources Division Tel. 74469

  11. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  12. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  13. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  14. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...... parameters the ETX parameter is used in relation to the length of the shortest path. Proposed methods are independent of the media type and can be implemented either in wireless or PLC....

  15. OverView of Space Applications for Environment (SAFE) initiative

    Science.gov (United States)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  16. OverView of Space Applications for Environment (SAFE) initiative

    International Nuclear Information System (INIS)

    Hamamoto, Ko; Fukuda, Toru; Nukui, Tomoyuki; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi

    2014-01-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes

  17. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  18. On the Performance of the Current MANET Routing Protocols for VoIP, HTTP, and FTP Applications

    Directory of Open Access Journals (Sweden)

    Waheb A. Jabbar

    2014-01-01

    Full Text Available The recent advances of ensemble mobile environment of smart devices with embedded sensors have enabled the MANET to play a key role in the smart cities as well as WSN and WMN. However, these smart devices are still limited in terms of energy, processor, and memory. Moreover, the efficient routing for reliable network connectivity at anytime, anywhere, and about everything is still a challenge in multihop wireless networks. This paper evaluates the QoS and energy efficiency of three active routing protocols: (i OLSRv2, a successor to OLSR, (ii DYMO, a successor to both DSR and AODV, and (iii MP-OLSR multipath extension to OLSRv2. In contrast to the related previous works which focused only on CBR traffic without considering the influence of specific traffic types on the performance of routing protocols, this work focused on this area from a different perspective. It evaluates the performance of three internet-based traffic types that can be used in the smart city applications: VoIP, HTTP, and FTP using different simulation models. The impact of the network density, load traffic, and nodes mobility on the considered protocols was evaluated by considering particular performance metrics for each traffic application. Based on the results, the study concludes by presenting useful recommendations for future work.

  19. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  20. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  1. Optimization of Nonambulant Mass Casualty Decontamination Protocols as Part of an Initial or Specialist Operational Response to Chemical Incidents.

    Science.gov (United States)

    Chilcott, Robert P; Mitchell, Hannah; Matar, Hazem

    2018-05-30

    The UK's Initial Operational Response (IOR) is a new process for improving the survival of multiple casualties following a chemical, biological, radiological or nuclear incident. Whilst the introduction of IOR represents a patient-focused response for ambulant casualties, there is currently no provision for disrobe and dry decontamination of nonambulant casualties. Moreover, the current specialist operational response (SOR) protocol for nonambulant casualty decontamination (also referred to as "clinical decontamination") has not been subject to rigorous evaluation or development. Therefore, the aim of this study was to confirm the effectiveness of putatively optimized dry (IOR) and wet (SOR) protocols for nonambulant decontamination in human volunteers. Dry and wet decontamination protocols were objectively evaluated using human volunteers. Decontamination effectiveness was quantified by liquid chromatography-mass spectrometry analysis of the recovery of a chemical warfare agent simulant (methylsalicylate) from skin and hair of volunteers, with whole-body fluorescence imaging to quantify the skin distribution of residual simulant. Both the dry and wet decontamination processes were rapid (3 and 4 min, respectively) and were effective in removing simulant from the hair and skin of volunteers, with no observable adverse effects related to skin surface spreading of contaminant. Further studies are required to assess the combined effectiveness of dry and wet decontamination under more realistic conditions and to develop appropriate operational procedures that ensure the safety of first responders.

  2. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  3. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  4. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  5. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  6. 7 CFR 4290.360 - Initial review of Applicant's management team's qualifications.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Initial review of Applicant's management team's...'s management team's qualifications. The Secretary will review the information submitted by the Applicant concerning the qualifications of the Applicant's management team to determine in his or her sole...

  7. A New Resource Allocation Protocol for the Backhaul of Underwater Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2018-01-01

    Full Text Available In this paper, an underwater base station initiating (UBSI resource allocation is proposed for underwater cellular wireless networks (UCWNs, which is a new approach to determine the backhaul capacity of underwater base stations (UBSs. This backhaul is a communication link from a UBS to a UBS controller (UBSC. Contrary to conventional resource allocation protocols, a UBS initiates to re-determine its backhaul capacity for itself according to its queue status; it releases a portion of its backhaul capacity in the case of experiencing resource under-utilization, and also requests additional backhaul capacity to the UBSC if packet drops are caused due to queue-overflow. This protocol can be appropriate and efficient to the underwater backhaul link where the transmission rate is quite low and the latency is unneglectable. In order to investigate the applicability of the UBSI resource allocation protocol to the UCWN, its performance is extensively analyzed via system level simulations. In our analysis, considered performance measures include average packet drop rate, average resource utilization, average message overhead, and the reserved capacity of the UBSC. In particular, the simulation results show that our proposed protocol not only utilizes most of the given backhaul capacity (more than 90 percent of resource utilization on the average, but also reduces controlling message overheads induced by resource allocation (less than 2 controlling messages on the average. It is expected that the simulation results and analysis in this paper can be used as operating guidelines to apply our new resource allocation protocol for the UCWN.

  8. An Experimental Protocol for Assessing the Performance of New Ultrasound Probes Based on CMUT Technology in Application to Brain Imaging.

    Science.gov (United States)

    Matrone, Giulia; Ramalli, Alessandro; Savoia, Alessandro Stuart; Quaglia, Fabio; Castellazzi, Gloria; Morbini, Patrizia; Piastra, Marco

    2017-09-24

    The possibility to perform an early and repeatable assessment of imaging performance is fundamental in the design and development process of new ultrasound (US) probes. Particularly, a more realistic analysis with application-specific imaging targets can be extremely valuable to assess the expected performance of US probes in their potential clinical field of application. The experimental protocol presented in this work was purposely designed to provide an application-specific assessment procedure for newly-developed US probe prototypes based on Capacitive Micromachined Ultrasonic Transducer (CMUT) technology in relation to brain imaging. The protocol combines the use of a bovine brain fixed in formalin as the imaging target, which ensures both realism and repeatability of the described procedures, and of neuronavigation techniques borrowed from neurosurgery. The US probe is in fact connected to a motion tracking system which acquires position data and enables the superposition of US images to reference Magnetic Resonance (MR) images of the brain. This provides a means for human experts to perform a visual qualitative assessment of the US probe imaging performance and to compare acquisitions made with different probes. Moreover, the protocol relies on the use of a complete and open research and development system for US image acquisition, i.e. the Ultrasound Advanced Open Platform (ULA-OP) scanner. The manuscript describes in detail the instruments and procedures involved in the protocol, in particular for the calibration, image acquisition and registration of US and MR images. The obtained results prove the effectiveness of the overall protocol presented, which is entirely open (within the limits of the instrumentation involved), repeatable, and covers the entire set of acquisition and processing activities for US images.

  9. A protocol for better design, application, and communication of population viability analyses.

    Science.gov (United States)

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  10. Cross-cultural adaptation of the Filial Responsibility protocol for use in Brazil

    Directory of Open Access Journals (Sweden)

    Marines Aires

    Full Text Available ABSTRACT Objective: To carry out a cross-cultural adaptation of the Filial Responsibility protocol for use in Brazil with adult child caregivers for elderly parents. Method: A methodological study that included the steps of initial translation, synthesis of translations, back-translation, committee of experts, pre-test, evaluation of psychometric measures and submission to authors. The protocol comprises a qualitative step, closed questions and seven scales: Filial Expectation, Subsidiary Compassion, Caregiver burden, Life Satisfaction, Personal Well-being and Quality of Relationships. Results: The final version in Portuguese was applied, through a pre-test, to a sample of 30 caregivers for elderly parents. In order to verify internal consistency, we used Cronbach’s alpha coefficient: Filial Expectation (α = 0.64, Filial Duty (α = 0.65, Satisfaction with Life (α = 0.75, Personal Wellbeing (α = 0.87. Final considerations: The Brazilian version presented good conceptual and face equivalence. The results demonstrate that the concepts used in the Canadian protocol are applicable in the Brazilian context.

  11. Instructional and Career Guidance in STEM: An Improvement Initiative to Create Opportunities for Female High School Students

    Science.gov (United States)

    Belcher, Aaron Heath

    The purpose of this disquisition is to disseminate an improvement initiative in a public high school that addressed female Science, Technology, Engineering and Math (STEM) disparity in STEM classes. In this high school current instructional and career guidance practices were inadequate in providing female STEM students opportunities to experience relevant instruction in STEM through the application of real world practices. The improvement initiative identified four interventions using qualitative research that addressed the question, how do instructional and career guidance practices that emphasize the real world application of STEM impact the academic choices and career aspirations of female STEM students? The interventions include (1) instructional feedback (2) instructional resources, (3) career coaching, and (4) community college partnership. These interventions were chosen as a result of insider research methods that followed a scan, focus, summarize framework for understanding the problem. The aim of the improvement initiative was to develop structured protocols that impact STEM classroom and career guidance practices. An intervention team intended to identify opportunities for female STEM students to experience the real world application of STEM. First, the research context is explained. Then, a review of the literature explains foundation knowledge that led to the conceptual and leadership framework. Next, the research methodology is outlined including design and participants, survey instruments, procedures, timeline, and measures. The research methodology is followed by an analysis of data for instructional and career guidance practice efficacy. Finally, a discussion of the initiative and its outcome are illustrated through the stories of three female STEM students. As a result of these stories, the intervention team developed STEM classroom observation protocols. These protocols can be used by school leaders as a structure for STEM instruction and career

  12. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  13. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  14. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Science.gov (United States)

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  15. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  16. Comparison of different initiation protocols in the resistant hepatocyte model

    International Nuclear Information System (INIS)

    Espandiari, Parvaneh; Robertson, Larry W.; Srinivasan, Cidambi; Glauert, Howard P.

    2005-01-01

    Several models in rat liver have been developed to study multistage carcinogenesis, including the Solt-Farber resistant hepatocyte model. In this model, initiation consists of either a necrogenic dose of a hepatocarcinogen or a non-necrogenic dose in conjunction with partial hepatectomy (PH). As an alternative to PH, we investigated two different procedures: fasting for 96 h followed by refeeding, or the use of one-day-old neonates. Male Fisher 344 rats were injected p.o. with diethylnitrosamine (DEN) (0, 20, or 100 mg/kg) 24 h after refeeding or PH (controls received DEN alone with no proliferative stimulus). For the neonatal group, male and female Fisher 344 rats were treated with DEN (0 or 20 mg/kg, i.p.) at one day of age. All initiated animals were treated at the same age (11 weeks) with the following selection agents: three daily doses of 2-acetylaminofluorene (AAF) (30 mg/kg), followed by a single dose of carbon tetrachloride (2 ml/kg), followed by three additional daily treatments of AAF (30 mg/kg). Rats were euthanized 2 weeks after the last AAF injection. The PH, neonatal male, and neonatal female groups receiving DEN developed more γ-glutamyl transpeptidase (GGT)-positive foci per cubic centimeter and foci per liver as compared to untreated rats receiving the same proliferative stimulus, whereas the fasting/refeeding group and the group receiving no proliferative stimulus did not. All DEN-treated groups receiving one of the proliferative stimuli had more foci per cubic centimeter than the DEN-treated group receiving no proliferative stimulus. The volume fractions of GGT-positive foci in the PH/DEN and neonatal male/DEN groups were higher than those of both the DEN-treated group receiving no proliferative stimulus and the groups receiving the same proliferative stimulus without DEN. In neonatal females-receiving DEN, the volume fraction was not different from either neonatal females not receiving DEN or DEN-treated rats receiving no proliferative

  17. REMINDER - FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. Users are requested to apply for a French card through the Users' Office. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue ...

  18. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  19. Modification of CAS-protocol for improvement of security web-applications from unauthorized access

    Directory of Open Access Journals (Sweden)

    Alexey I Igorevich Alexandrov

    2017-07-01

    Full Text Available Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data. The problem of setting up secure user identification is probably one of the most common tasks, which occur in the process of software development. Today, despite the availability of a large amount of authentication tools, new solutions, mechanisms and technologies are being introduced regularly. Primarily, it is done to increase the security level of data protection against unauthorized access. This article describes the experience of using central user authentication service based on CAS-protocol (CAS – Central Authentication Service and free open source software, analyzing its main advantages and disadvantages and describing the possibility of its modification, which would increase security of web-based information systems from being accessed illegally. The article contains recommendations for setting a maximum time limit for users working on services, integrated with central authentication; and, analyses the research of implementing modern web-technologies while using user authentication system based on CAS-protocol. In addition, it describes the ways of CAS-server modernization for developing additional modules: a module for collecting and analyzing the use of information systems, and another one, for a user management system. Furthermore, CAS-protocol can be used at universities and other organizations for creating a unified information environment in education.

  20. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  1. Acceptance testing in digital systens of mammography. Protocols applicability; Pruebas de aceptacion en equipos digitales de mamografia. Aplicabilidad de protocolos

    Energy Technology Data Exchange (ETDEWEB)

    Bermudez, R.; Espana, M.L.; Garcia Castanon, P.; Gomez Barrado, A.; Rodriguez Martin, G.; Fernandez Bedoya, B.

    2011-07-01

    Acceptance testing of mammographic imaging systems technical is the first approach in order to guarantee that mammograms will be achieved with the minimun radiation dose compatible with an image quality sutiable for diagnose purposes. The aim of this study is to assess the practical applicability of different protocols in acceptance test of digital mammographyc systems. This study has been carried out on the results of ltyhe acceptance tests of five flat panel digital mammographic systems. Parameters established in the systems technical specifications and those evaluated in the consulted protocols were tested. Due to the fact that the legislation oin our country does not demand to consider a specific protocol, the results obtained were also compared considering different existing protocols. Results show discrepancies between manufacturers limiting values and those established in the protocols. Some parameters, such as the authomatic exposure control compensation and the detector noise, were found out to meet or not the limiting value, depending on the selected protocol. From our results we could suggest, that protocols from manufacturers should be adapted to acknowledged documents on acceptance testing in digital mammography. They buyer representative could even specify the protocol to be followed during the acceptance tests. (Author). 25 refs.

  2. Acceptance testing in digital systems of mammography. Protocols applicability; Pruebas de aceptacion en equipos digitales de mamografia. Aplicabilidad de protocolos

    Energy Technology Data Exchange (ETDEWEB)

    Bermudez, R.; Espana, M.L.; Garcia Castanon, P.; Gomez Barrado, A.; Rodriguez Martin, G.; Fernandez Bedoya, B.

    2011-07-01

    Acceptance testing of mammographic imaging systems technical is the first approach in order to guarantee that mammograms will be achieved with the minimum radiation dose compatible with an image quality suitable for diagnose purposes. The aim of this study is to assess the practical applicability of different protocols in acceptance test of digital mammographic systems. This study has been carried out on the results of the acceptance tests of five flat panel digital mammographic systems. Parameters established in the systems technical specifications and those evaluated in the consulted protocols were tested. Due to the fact that the legislation in our country does not demand to consider a specific protocol, the results obtained were also compared considering different existing protocols. Results show discrepancies between manufacturers limiting values and those established in the protocols. Some parameters, such as the automatic exposure control compensation and the detector noise, were found out to meet or not the limiting value, depending on the selected protocol. From our results we could suggest, that protocols from manufacturers should be adapted to acknowledged documents on acceptance testing in digital mammography. They buyer representative could even specify the protocol to be followed during the acceptance tests. (Author). 25 refs.

  3. Lower limb ice application alters ground reaction force during gait initiation

    Directory of Open Access Journals (Sweden)

    Thiago B. Muniz

    2015-04-01

    Full Text Available BACKGROUND: Cryotherapy is a widely used technique in physical therapy clinics and sports. However, the effects of cryotherapy on dynamic neuromuscular control are incompletely explained. OBJECTIVES: To evaluate the effects of cryotherapy applied to the calf, ankle and sole of the foot in healthy young adults on ground reaction forces during gait initiation. METHOD: This study evaluated the gait initiation forces, maximum propulsion, braking forces and impulses of 21 women volunteers through a force platform, which provided maximum and minimum ground reaction force values. To assess the effects of cooling, the task - gait initiation - was performed before ice application, immediately after and 30 minutes after removal of the ice pack. Ice was randomly applied on separate days to the calf, ankle and sole of the foot of the participants. RESULTS: It was demonstrated that ice application for 30 minutes to the sole of the foot and calf resulted in significant changes in the vertical force variables, which returned to their pre-application values 30 minutes after the removal of the ice pack. Ice application to the ankle only reduced propulsion impulse. CONCLUSIONS: These results suggest that although caution is necessary when performing activities that require good gait control, the application of ice to the ankle, sole of the foot or calf in 30-minute intervals may be safe even preceding such activities.

  4. Audit protocol of compliance test on x-ray and interventional radiodiagnostic

    International Nuclear Information System (INIS)

    Endang Kunarsih; Fitria Sandra

    2011-01-01

    Testing protocol is a document that defined and implemented by the testing agency in conducting compliance testing to ensure that quality of testing implementation is planned and controlled in accordance with applicable regulations and standards. Testing protocol is required in filing an application to be a qualified testing agency. Auditors will review the testing protocol document to assess adequacy of the acceptance criteria before proceed to the next process. This paper presents the acceptance criteria required in an audit of the testing protocol document from the applicant of testing agency. (author)

  5. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  6. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  7. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  8. A Robust PCR Protocol for HIV Drug Resistance Testing on Low-Level Viremia Samples

    Directory of Open Access Journals (Sweden)

    Shivani Gupta

    2017-01-01

    Full Text Available The prevalence of drug resistance (DR mutations in people with HIV-1 infection, particularly those with low-level viremia (LLV, supports the need to improve the sensitivity of amplification methods for HIV DR genotyping in order to optimize antiretroviral regimen and facilitate HIV-1 DR surveillance and relevant research. Here we report on a fully validated PCR-based protocol that achieves consistent amplification of the protease (PR and reverse transcriptase (RT regions of HIV-1 pol gene across many HIV-1 subtypes from LLV plasma samples. HIV-spiked plasma samples from the External Quality Assurance Program Oversight Laboratory (EQAPOL, covering various HIV-1 subtypes, as well as clinical specimens were used to optimize and validate the protocol. Our results demonstrate that this protocol has a broad HIV-1 subtype coverage and viral load span with high sensitivity and reproducibility. Moreover, the protocol is robust even when plasma sample volumes are limited, the HIV viral load is unknown, and/or the HIV subtype is undetermined. Thus, the protocol is applicable for the initial amplification of the HIV-1 PR and RT genes required for subsequent genotypic DR assays.

  9. Individualized music for dementia: Evolution and application of evidence-based protocol.

    Science.gov (United States)

    Gerdner, Linda A

    2012-04-22

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.

  10. A Machine-to-Machine protocol benchmark for eHealth applications - Use case: Respiratory rehabilitation.

    Science.gov (United States)

    Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco

    2016-06-01

    M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  12. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  13. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  14. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  15. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  16. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  17. Using the intervention mapping protocol to reduce European preschoolers’ sedentary behavior, an application to the ToyBox-Study

    Science.gov (United States)

    2014-01-01

    Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with

  18. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study.

    Science.gov (United States)

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-02-19

    High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The

  19. Protocols for atomistic modeling of water uptake into zeolite crystals for thermal storage and other applications

    International Nuclear Information System (INIS)

    Fasano, Matteo; Borri, Daniele; Chiavazzo, Eliodoro; Asinari, Pietro

    2016-01-01

    Highlights: • Numerical protocols for modeling water adsorption and infiltration into zeolite. • A priori screening of new materials for heat storage and desalination is possible. • Water uptake isotherms for bridging atomistic and engineering scales. - Abstract: We report numerical protocols for describing the water uptake process into microporous materials, with special emphasis on zeolite crystals. A better understanding and more predictive tools of the latter process are critical for a number of modern engineering applications, ranging from the optimization of loss free and compact thermal storage plants up to more efficient separation processes. Water sorption (and desorption) is indeed the key physical phenomenon to consider when designing several heat storage cycles, whereas water infiltration is to be studied when concerned with sieving through microporous materials for manufacturing selective membranes (e.g. water desalination by reverse osmosis). Despite the two quite different applications above, in this article we make an effort for illustrating a comprehensive numerical framework for predicting the engineering performances of microporous materials, based on detailed atomistic models. Thanks to the nowadays spectacular progresses in synthesizing an ever increasing number of new materials with desired properties such as zeolite with various concentrations of hydrophilic defects, we believe that the reported tools can possibly guide engineers in choosing and optimizing innovative materials for (thermal) engineering applications in the near future.

  20. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  1. CERN and the 10,000th application of the WorldFIP protocol

    CERN Multimedia

    2001-01-01

    On 24 April, CERN received an award for the 10,000th application of the WorldFIP industrial communication network protocol. The award was presented to Juan Antonio Rubio, Head of CERN's ETT Division, by Marc Desjardins, President of the WorldFIP association, which groups together 430 industrial partners with the aim of promoting the WorldFIP concept. Marc Desjardins, President of the WorldFIP association, presenting the award for the 10,000th application to CERN ETT Division Leader Juan Antonio Rubio. From left to right: Guy Baribaud (CERN), Ercole Gallacio (WF), Noël Fayard (WF), Gérard Demars (WF), Dario Fantoni (WF), Marc Desjardins (WF), Raymond Brun (CERN), Jean-Pierre Hauet (WF), Juan Antonio Rubio (CERN), Bernard Jouga (WF), Raymond Rausch (CERN), Jean-Pierre Froidevaux (WF), Marilena Streit-Bianchi (CERN), Michel Rabany (CERN), Patrick Chatelet (WF), Nicolas Cravoisy (WF), Jean Bergeal (WF). Communication networks, also known as fieldbuses, provide for digital comunication betwe...

  2. 9 CFR 2.11 - Denial of initial license application.

    Science.gov (United States)

    2010-01-01

    ... have violated any Federal, State, or local laws or regulations pertaining to animal cruelty within 1... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Denial of initial license application. 2.11 Section 2.11 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT...

  3. Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications

    Directory of Open Access Journals (Sweden)

    Jehad Al Dallal

    2008-01-01

    Full Text Available Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC from a given service specification (S-SPEC. The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.

  4. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  5. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  6. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  7. GaN Initiative for Grid Applications (GIGA)

    Energy Technology Data Exchange (ETDEWEB)

    Turner, George [MIT Lincoln Lab., Lexington, MA (United States)

    2015-07-03

    For nearly 4 ½ years, MIT Lincoln Laboratory (MIT/LL) led a very successful, DoE-funded team effort to develop GaN-on-Si materials and devices, targeting high-voltage (>1 kV), high-power, cost-effective electronics for grid applications. This effort, called the GaN Initiative for Grid Applications (GIGA) program, was initially made up of MIT/LL, the MIT campus group of Prof. Tomas Palacios (MIT), and the industrial partner M/A Com Technology Solutions (MTS). Later in the program a 4th team member was added (IQE MA) to provide commercial-scale GaN-on-Si epitaxial materials. A basic premise of the GIGA program was that power electronics, for ubiquitous utilization -even for grid applications - should be closer in cost structure to more conventional Si-based power electronics. For a number of reasons, more established GaN-on-SiC or even SiC-based power electronics are not likely to reach theses cost structures, even in higher manufacturing volumes. An additional premise of the GIGA program was that the technical focus would be on materials and devices suitable for operating at voltages > 1 kV, even though there is also significant commercial interest in developing lower voltage (< 1 kV), cost effective GaN-on-Si devices for higher volume applications, like consumer products. Remarkable technical progress was made during the course of this program. Advances in materials included the growth of high-quality, crack-free epitaxial GaN layers on large-diameter Si substrates with thicknesses up to ~5 μm, overcoming significant challenges in lattice mismatch and thermal expansion differences between Si and GaN in the actual epitaxial growth process. Such thick epilayers are crucial for high voltage operation of lateral geometry devices such as Schottky barrier (SB) diodes and high electron mobility transistors (HEMTs). New “Normally-Off” device architectures were demonstrated – for safe operation of power electronics circuits. The trade-offs between lateral and

  8. Role of chemical carcinogens in epithelial and mesenchymal neoplasms with tumor initiation-promotion protocol and the effect of 13-cis retinoic acid in chemo prevention

    International Nuclear Information System (INIS)

    Bukhari, S.M.H.; Shahzad, S.Q.; Naeem, S.; Qureshi, G.R.; Naveed, I.A.

    2002-01-01

    Objective: To study the effects of chemical carcinogens on epithelial and mesenchymal tumorigenesis with tumor initiation-promotion protocol and the use of 13-cis retinoic acid as a chemo preventive agent. Design: It was an experimental study. Place and Duration of Study: The study was conducted at Postgraduate Medical Institute (PGML) Lahore for 20 weeks. Materials and Methods: Sixty albino rats were divided into six groups of ten of animals each. First group of animals (control) was not given carcinogens and 13-cis retinoic acid in second group DMBA was applied on the dorsal skin in repeated dos of 100 mu g/ml in acetone, twice a weak. In the third group DMBA was given 100 mu g/ml as single dose while TPA was given 10 mu g//ml in acetone, twice a weak after two weeks of DMBA applications. In fourth group only DMBA 100 mu g/ml in acetone was applied as a single dose. In fifth and sixth groups 13-cis retinoic acid was given topically before and after the application of DMBA and TPA. Results: First and fourth groups did not develop any tumor. In second groups 2 animals developed malignant fibrous histiocytoma, 4 squamous cell carcinoma while 1 dysphasia and 1 carcinoma in situ. Third group developed osteoma (3 animals), papilloma (3 animals, squamous cell carcinoma (01) and dysplasia (01). Conclusion: Our results showed that DMBA acts as tumor initiator while TPA as promoter. DMBA also produces tumors itself when given alone in repeated doses. The chemical carcinogens are not only a cause of epithelial carcinogenesis but also responsible for mesenchymal tumorigenesis. 13 cis retinoic acid was equally effective in both stages of tumorigenesis. It also prevents malignant conversion of chemically induced benign tumors. (author)

  9. A universal data access and protocol integration mechanism for smart home

    Science.gov (United States)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  10. Energy Efficient Clustering Protocol to Enhance Performance of Heterogeneous Wireless Sensor Network: EECPEP-HWSN

    Directory of Open Access Journals (Sweden)

    Santosh V. Purkar

    2018-01-01

    Full Text Available Heterogeneous wireless sensor network (HWSN fulfills the requirements of researchers in the design of real life application to resolve the issues of unattended problem. But, the main constraint faced by researchers is the energy source available with sensor nodes. To prolong the life of sensor nodes and thus HWSN, it is necessary to design energy efficient operational schemes. One of the most suitable approaches to enhance energy efficiency is the clustering scheme, which enhances the performance parameters of WSN. A novel solution proposed in this article is to design an energy efficient clustering protocol for HWSN, to enhance performance parameters by EECPEP-HWSN. The proposed protocol is designed with three level nodes namely normal, advanced, and super, respectively. In the clustering process, for selection of cluster head we consider different parameters available with sensor nodes at run time that is, initial energy, hop count, and residual energy. This protocol enhances the energy efficiency of HWSN and hence improves energy remaining in the network, stability, lifetime, and hence throughput. It has been found that the proposed protocol outperforms than existing well-known LEACH, DEEC, and SEP with about 188, 150, and 141 percent respectively.

  11. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  12. Influence of a multidisciplinary protocol on nutritional status at diagnosis in amyotrophic lateral sclerosis.

    Science.gov (United States)

    López-Gómez, Juan José; Torres-Torres, Beatriz; Gómez-Hoyos, Emilia; Fernández-Buey, Nieves; Ortolá-Buigues, Ana; Castro-Lozano, Ángeles; Arenillas-Lara, Juan F; De Luis-Román, Daniel A

    2018-04-01

    The aim of this study were to understand the influence of a multidisciplinary care protocol in amyotrophic lateral sclerosis (ALS) on the change in the delay of remission to the nutrition specialist and the initial nutritional status. A cohort study was performed in 43 patients with ALS who were referred to the Nutrition Unit between April 2015 and April 2017. Anthropometric parameters and diagnostic times were collected, and the nutritional status was studied through subjective global assessment (SGA). Patients who were included before (control cohort [NoP]) and after (protocol cohort [P]) a multidisciplinary protocol were compared. The mean age of the participants was 66.79 y (10.86 y). Of the patients, 62.8% belonged to the protocol cohort. Patients who started the protocol had a lower delay in initial assessment by a nutrition specialist (P:2 [1-6] mo/NoP:12 [10-29] mo; P = 0.03). When the nutritional status was analyzed according to the SGA, more patients who did not initiate protocol were in the state of severe malnutrition (C) (P 22.2% versus NoP 60%; P = 0.01). Entry into the protocol was an independent protective factor of the presence of severe malnutrition at the beginning of the nutritional follow-up (odds ratio, 0.20; 95% confidence interval, 0.03-0.73; P = 0.02). The implementation of a multidisciplinary protocol in ALS allowed patients to present a lower percentage of severe malnutrition in an initial assessment by the nutrition specialist. This protocol is a protective factor for the presence of malnutrition at the beginning of support. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  14. Successful implementation of a perioperative glycemic control protocol in cardiac surgery: barrier analysis and intervention using lean six sigma.

    Science.gov (United States)

    Martinez, Elizabeth A; Chavez-Valdez, Raul; Holt, Natalie F; Grogan, Kelly L; Khalifeh, Katherine W; Slater, Tammy; Winner, Laura E; Moyer, Jennifer; Lehmann, Christoph U

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  15. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Science.gov (United States)

    Martinez, Elizabeth A.; Chavez-Valdez, Raul; Holt, Natalie F.; Grogan, Kelly L.; Khalifeh, Katherine W.; Slater, Tammy; Winner, Laura E.; Moyer, Jennifer; Lehmann, Christoph U.

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period. PMID:22091218

  16. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Directory of Open Access Journals (Sweden)

    Elizabeth A. Martinez

    2011-01-01

    Full Text Available Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  17. Protocol Additional to the Agreement between the People's Republic of China and the International Atomic Energy Agency for the Application of Safeguards in China

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of China and the International Atomic Energy Agency for the application of safeguards in China is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 31 December 1998. Pursuant to Article 10 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from China written notification that China's statutory and constitutional requirements for entry into force have been met, i.e. on 28 March 2002

  18. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  19. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Signature, ratification, acceptance, approval or accession. Status as of 31 December 1996

    International Nuclear Information System (INIS)

    1997-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 31 December 1996. The Joint Protocol entered into force on 27 April 1992

  20. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Signature, ratification, acceptance, approval or accession. Status as of 31 December 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-28

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 31 December 1996. The Joint Protocol entered into force on 27 April 1992.

  1. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  2. [Peripheral vertigo versus central vertigo. Application of the HINTS protocol].

    Science.gov (United States)

    Batuecas-Caletrío, Ángel; Yáñez-González, Raquel; Sánchez-Blanco, Carmen; González-Sánchez, Enrique; Benito, José; Gómez, José Carlos; Santa Cruz-Ruiz, Santiago

    2014-10-16

    One of the most important dilemmas concerning vertigo in emergency departments is its differential diagnosis. There are highly sensitive warning signs in the examination that can put us on the path towards finding ourselves before a case of central vertigo. To determine how effective the application of the HINTS protocol is in the diagnosis of cerebrovascular accidents that mimics peripheral vertigo. We conducted a descriptive observation-based study on patients admitted to hospital with a diagnosis of acute vestibular syndrome in the emergency department. All the patients were monitored on a day-to-day basis until their symptoms improved, with information about nystagmus, the oculocephalic manoeuvre and the skew test. The results from the magnetic resonance imaging study were compared with the alteration of any of those three signs during the time the patient was hospitalised. Altogether 91 patients were examined, with a mean age of 55.8 years. A cerebrovascular accident was observed in eight cases. Of these (mean age: 71 years), in seven of them there were alterations in some of the HINTS signs, and in one case the study was normal (sensitivity: 0.88; specificity: 0.96). All of them had some vascular risk factor. Faced with a patient who visits the emergency department with an acute vestibular syndrome, a suitably directed examination is essential to be able to establish the differential diagnosis between peripheral and central pathology, since some cerebrovascular accidents can present with the appearance of acute vertigo. Applying a protocol like HINTS makes it possible to suspect the central pathology with a high degree of sensitivity and specificity.

  3. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  4. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  5. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  6. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  7. Initialization, conceptualization, and application in the generalized (fractional) calculus.

    Science.gov (United States)

    Lorenzo, Carl F; Hartley, Tom T

    2007-01-01

    This paper provides a formalized basis for initialization in the fractional calculus. The intent is to make the fractional calculus readily accessible to engineering and the sciences. A modified set of definitions for the fractional calculus is provided which formally include the effects of initialization. Conceptualizations of fractional derivatives and integrals are shown. Physical examples of the basic elements from electronics are presented along with examples from dynamics, material science, viscoelasticity, filtering, instrumentation, and electrochemistry to indicate the broad application of the theory and to demonstrate the use of the mathematics. The fundamental criteria for a generalized calculus established by Ross (1974) are shown to hold for the generalized fractional calculus under appropriate conditions. A new generalized form for the Laplace transform of the generalized differintegral is derived. The concept of a variable structure (order) differintegral is presented along with initial efforts toward meaningful definitions.

  8. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  9. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  10. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  11. A Distributed Snapshot Protocol for Efficient Artificial Intelligence Computation in Cloud Computing Environments

    Directory of Open Access Journals (Sweden)

    JongBeom Lim

    2018-01-01

    Full Text Available Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applications and guarantee the service level agreement, cloud computing should provide not only computing resources but also fundamental mechanisms for efficient computing. In this regard, a snapshot protocol has been used to create a consistent snapshot of the global state in cloud computing environments. However, the existing snapshot protocols are not optimized in the context of artificial intelligence applications, where large-scale iterative computation is the norm. In this paper, we present a distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments. The proposed snapshot protocol is based on a distributed algorithm to run interconnected multiple nodes in a scalable fashion. Our snapshot protocol is able to deal with artificial intelligence applications, in which a large number of computing nodes are running. We reveal that our distributed snapshot protocol guarantees the correctness, safety, and liveness conditions.

  12. Fast Oblivious AES A Dedicated application of the MiniMac protocol

    DEFF Research Database (Denmark)

    Zakarias, Rasmus Winther; Damgård, Ivan Bjerre

    2015-01-01

    We present an actively secure multi-partycomputation of the Advanced Encryption Standard (AES). To the best of our knowledge it is the fastest of its kind to date. We start from an efficient actively secure evaluation of general binary circuits that was implemented by the authors of [DLT14......]. They presented an optimized implementation of the so-called MiniMac protocol [DZ13] that runs in the pre-processing model, and applied this to a binary AES circuit. In this paper we de- scribe how to dedicate the pre-processing to the structure of AES, which improves significantly the throughput and latency...... of previous actively secure implementations. We get a latency of about 6 ms and amortised time about 0.4 ms per AES block, which seems completely adequate for practical applications such as verification of 1-time passwords....

  13. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  14. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 12 September 2000. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    2000-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 12 September 2000. The Joint Protocol entered into force on 27 April 1992

  15. Joint Protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 30 September 2002. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    2002-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 30 September 2002. The Joint Protocol entered into force on 27 April 1992

  16. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  17. Application and Implementation of Network Coding for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk

    2012-01-01

    the initial development of systems and protocols and show that the potential is there. However, I also find that network coding needs to be implemented with care and protocols have to be designed with consideration to make use of this novel technique. 2) The final aspect of this PhD investigates different...... ways that cooperative models may be implemented to cover a wide range of applications. This addresses the development of user cooperative protocols and how we in Device To Device (D2D) communication may reward users that contribute more to the network than they gain. In this area I suggest the use...

  18. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  19. Two-party quantum key agreement protocol with four-particle entangled states

    Science.gov (United States)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  20. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  1. In vitro protocol for validating interface pressure sensors for therapeutic compression garments: Importance of sphygmomanometer placement and initial cuff diameter

    Directory of Open Access Journals (Sweden)

    Inhwa Jung

    2018-02-01

    Full Text Available An optimal protocol is needed to validate the performance of future interface pressure sensors for compression garments when using a sphygmomanometer. PicoPress® was used on a rigid plastic cylinder (r=4 cm. An FDA-cleared aneroid sphygmomanometer was used to apply pressures from 10-60 mmHg with a diameter of 8 cm or 12 cm placed either beneath the sphygmomanometer’s airbag or fabric cuff. A two-tail t-test was performed (P<0.05 for significance for all applied pressures. PicoPress® outputs vary with sensor placement (airbag vs fabric cuff and the initial cuff diameter. Sensor placement overlying the sphygmomanometer’s fabric cuff compared to the airbag led to significantly higher pressures (37%-135% depending on the cuff diameter size. These differences were nearly all statistically significant (P<0.05. Validation of new interface pressure sensors deploying a sphygmomanometer for calibration should specify the location of sensor placement location and initial diameter with a preference for placement under the airbag.

  2. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  3. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  4. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  5. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Science.gov (United States)

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  6. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    Science.gov (United States)

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  7. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Directory of Open Access Journals (Sweden)

    Dixys L. Hernández-Rojas

    2017-12-01

    Full Text Available The Internet of Things (IoT involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons, LP4S-X (for more powerful beacons and LP4S-J (for beacons able to run complex firmware. In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6 is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format. Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  8. Application of Quantum Process Calculus to Higher Dimensional Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Simon J. Gay

    2014-07-01

    Full Text Available We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science. We have extended the quantum process calculus to describe d-dimensional quantum systems, which has not been done before. We summarise the necessary theory in the generalisation of quantum gates and Bell states and use the theory to apply the quantum process calculus CQP to quantum protocols, namely qudit teleportation and superdense coding.

  9. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    Science.gov (United States)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  10. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  11. Performance Analysis of Secure and Private Billing Protocols for Smart Metering

    Directory of Open Access Journals (Sweden)

    Tom Eccles

    2017-11-01

    Full Text Available Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting.

  12. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  13. The application of PS printing plate with Biimidazole photosensitive initiating systems

    International Nuclear Information System (INIS)

    Li Lidong; Xu Jinqi; Gao Fang; Yang Yongyuan

    1999-01-01

    The ultraviolet photosensitive initiating system is composed of 4,4'-bis(N,N'-dimethyl-amino)benzophenone(MK), 2-chlorohexaarylbiimidazole(o-C1-HABI) and a hydrogen donor co-initiator n-dodecyl mercaptan(SH). Under the irradiation by high pressure mercury lamp, the relationship between the photo-polymerization rate of MMA and the concentration of each component of the system, including MK, o-C1-HABI and SH, was studied. The excellent results have been obtained through studying the system's application on PS lithographic printing plate

  14. Effect of prophylactic polishing protocols on the surface roughness of esthetic restorative materials.

    Science.gov (United States)

    Neme, A L; Frazier, K B; Roeder, L B; Debner, T L

    2002-01-01

    Many polishing protocols have been evaluated in vitro for their effect on the surface roughness of restorative materials. These results have been useful in establishing protocols for in vivo application. However, limited research has focused on the subsequent care and maintenance of esthetic restorations following their placement. This investigation evaluated the effect of five polishing protocols that could be implemented at recall on the surface roughness of five direct esthetic restorative materials. Specimens (n=25) measuring 8 mm diameter x 3 mm thick were fabricated in an acrylic mold using five light-cured resin-based materials (hybrid composite, microfilled composite, packable composite, compomer and resin-modified glass ionomer). After photopolymerization, all specimens were polished with Sof-Lex Disks to produce an initial (baseline) surface finish. All specimens were then polished with one of five prophylactic protocols (Butler medium paste, Butler coarse paste, OneGloss, SuperBuff or OneGloss & SuperBuff). The average surface roughness of each treated specimen was determined from three measurements with a profilometer (Surface 1). Next, all specimens were brushed 60,000 times at 1.5 Hz using a brush-head force of 2 N on a Manly V-8 cross-brushing machine in a 50:50 (w/w) slurry of toothpaste and water. The surface roughness of each specimen was measured after brushing (Surface 2) followed by re-polishing with one of five protocols, then final surface roughness values were determined (Surface 3). The data were analyzed using repeated measures ANOVA. Significant differences (p=0.05) in surface roughness were observed among restorative materials and polishing protocols. The microfilled and hybrid resin composite yielded significantly rougher surfaces than the other three materials following tooth brushing. Prophylactic polishing protocols can be used to restore a smooth surface on resin-based esthetic restorative materials following simulated tooth

  15. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    OpenAIRE

    Hadeel Saleh Haj Aliwi; Putra Sumari

    2016-01-01

    Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call eve...

  16. From initial application to routine operation: Reviewing the Applications for Power Uprates

    International Nuclear Information System (INIS)

    Garis, Ninos; Skaanberg, Lars

    2007-01-01

    Current plans for power uprates in Swedish nuclear power plants will lead to significant increases in seven units and a lesser increase in one unit. To date SKI has received six applications, and two more are due in 2007. A power uprate process is initiated by the application to the Government by a licensee for approval to increase the thermal output of a reactor unit. This request is addressed to the Government and is forwarded to SKI for a preliminary safety review. The result of the review is then provided by SKI as a basis for a governmental decision. Six applications have been taken through the first stage of the process; of these, three have received governmental approval and three are currently awaiting a decision. If the licensee's application is approved by the Government, deeper analyses and studies are required in order to modify the plant and update the safety analysis report and the associated technical specifications. SKI reviews this material on a continuous basis prior to test and routine operation at the increased power level. There are four stages that require attention and review by SKI; 1. Review of the application to the Government for approval to operate at increased power levels, and preparation of a suitable answer. 2. Review and approval of the preliminary safety analysis report (PSAR) 3. Review and approval of the application for testing at the higher power level 4. Review and approval of routine operation at the higher power level. A thorough description of the handling of a power uprate process can be found in the SKI PM (SKI-PM 04:11) that is available on the SKI website (in Swedish)

  17. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  18. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  19. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    2005-04-01

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  20. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    Science.gov (United States)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  1. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    Science.gov (United States)

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics

  2. MDCT of acute pancreatitis: Intraindividual comparison of single-phase versus dual-phase MDCT for initial assessment of acute pancreatitis using different CT scoring systems

    Energy Technology Data Exchange (ETDEWEB)

    Avanesov, Maxim, E-mail: m.avanesov@uke.de [Department of Diagnostic and Interventional Radiology and Nuclear Medicine, University Medical Center Hamburg-Eppendorf, Hamburg (Germany); Weinrich, Julius M.; Kraus, Thomas [Department of Diagnostic and Interventional Radiology and Nuclear Medicine, University Medical Center Hamburg-Eppendorf, Hamburg (Germany); Derlin, Thorsten [Department of Nuclear Medicine, Hannover Medical School (Germany); Adam, Gerhard; Yamamura, Jin [Department of Diagnostic and Interventional Radiology and Nuclear Medicine, University Medical Center Hamburg-Eppendorf, Hamburg (Germany); Karul, Murat [Department of Diagnostic and Interventional Radiology, Marienkrankenhaus Hamburg (Germany)

    2016-11-15

    Objectives: The purpose of the retrospective study was to evaluate the additional value of dual-phase multidetector computed tomography (MDCT) protocols over a single-phase protocol on initial MDCT in patients with acute pancreatitis using three CT-based pancreatitis severity scores with regard to radiation dose. Methods: In this retrospective, IRB approved study MDCT was performed in 102 consecutive patients (73 males; 55years, IQR48–64) with acute pancreatitis. Inclusion criteria were CT findings of interstitial edematous pancreatitis (IP) or necrotizing pancreatitis (NP) and a contrast-enhanced dual-phase (arterial phase and portal-venous phase) abdominal CT performed at ≥72 h after onset of symptoms. The severity of pancreatic and extrapancreatic changes was independently assessed by 2 observers using 3 validated CT-based scoring systems (CTSI, mCTSI, EPIC). All scores were applied to arterial phase and portal venous phase scans and compared to score results of portal venous phase scans, assessed ≥14 days after initial evaluation. For effective dose estimation, volume CT dose index (CTDIvol) and dose length product (DLP) were recorded in all examinations. Results: In neither of the CT severity scores a significant difference was observed after application of a dual-phase protocol compared with a single-phase protocol (IP: CTSI: 2.7 vs. 2.5, p = 0.25; mCTSI: 4.0 vs. 4.0, p = 0.10; EPIC: 2.0 vs. 2.0, p = 0.41; NP: CTSI: 8.0 vs. 7.0, p = 0.64; mCTSI: 8.0 vs. 8.0, p = 0.10; EPIC: 3.0 vs. 3.0, p = 0.06). The application of a single-phase CT protocol was associated with a median effective dose reduction of 36% (mean dose reduction 31%) compared to a dual-phase CT scan. Conclusions: An initial dual-phase abdominal CT after ≥72 h after onset of symptoms of acute pancreatitis was not superior to a single-phase protocol for evaluation of the severity of pancreatic and extrapancreatic changes. However, the effective radiation dose may be reduced by 36% using a

  3. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  4. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition); Guide d'application des garanties pour les Etats ayant des protocoles relatifs aux petites quantites de matieres

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-10-15

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  5. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  6. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  7. Modified calibration protocol evaluated in a model-based testing of SBR flexibility

    DEFF Research Database (Denmark)

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià

    2011-01-01

    The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provide...

  8. Therapeutic efficacy and toxicity of bolus application of chemotherapy protocol in the treatment of metastatic colorectal cancer.

    Science.gov (United States)

    Šišić, Ibrahim; Pojskić, Belma; Mekić Abazović, Alma; Kovčin, Vladimir

    2015-08-01

    To compare efficacy and toxicity of bolus application of chemotherapy protocol, oxaliplatin, fluorouracil (bolus), leucovorin (folfox) between two groups of patients in the therapy of metastatic colorectal carcinoma (mCRC). A total of 63 patients were treated for mCRC in the period January 2009 - January 2010 at the Department of Oncology of the Cantonal Hospital Zenica, Bosnia and Herzegovina (first group, 30 patients) and at the Department of Oncology of the Clinical Hospital Centre Bežanijska kosa in Belgrade, Serbia, in the period January 2005 - January 2006 (second group, 33 patients). The patients were treated according the same protocol, i.v. bolus infusion, but in different day intervals (D), 1, 8, 15/28 days or D1-D5/28 days, respectively. In all patients the following factors were analyzed: tumor response, overall survival (OS), progression free survival, hematological and non-hematological toxicity . Colon was the primary localization in almost two thirds of patients. There was no statistically significant difference between the groups according to the age, hematological and non-hematological toxicity, as well as in achieved OS. Progression free survival expressed in months was in average 5 months though with a large range between minimal and maximal survival time. Both groups have shown equivalent efficacy to applied chemotherapy protocols. Overall survival in the two groups matched data from the literature. Further research should confirm success of the combination of chemotherapy protocols and their combination with the biological therapy. Copyright© by the Medical Assotiation of Zenica-Doboj Canton.

  9. Therapeutic efficacy and toxicity of bolus application of chemotherapy protocol in the treatment of metastatic colorectal cancer

    Directory of Open Access Journals (Sweden)

    Ibrahim Šišić

    2015-08-01

    Full Text Available Aim To compare efficacy and toxicity of bolus application of chemotherapy protocol, oxaliplatin, fluorouracil (bolus, leucovorin (folfox between two groups of patients in the therapy of metastatic colorectal carcinoma (mCRC. Methods A total of 63 patients were treated for mCRC in the period January 2009 – January 2010 at the Department of Oncology of the Cantonal Hospital Zenica, Bosnia and Herzegovina (first group, 30 patients and at the Department of Oncology of the Clinical Hospital Centre Bežanijska kosa in Belgrade, Serbia, in the period January 2005 – January 2006 (second group, 33 patients. The patients were treated according the same protocol, i.v. bolus infusion, but in different day intervals (D, 1, 8, 15/28 days or D1-D5/28 days, respectively. In all patients the following factors were analyzed: tumor response, overall survival (OS, progression free survival, hematological and non-hematological toxicity. Results Colon was the primary localization in almost two thirds of patients. There was no statistically significant difference between the groups according to the age, hematological and non-hematological toxicity, as well as in achieved OS. Progression free survival expressed in months was in average 5 months though with a large range between minimal and maximal survival time. Conclusion Both groups have shown equivalent efficacy to applied chemotherapy protocols. Overall survival in the two groups matched data from the literature. Further research should confirm success of the combination of chemotherapy protocols and their combination with the biological therapy.

  10. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  11. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  12. Dynamic whole body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-01-01

    Static whole body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single bed-coverage limiting the axial field-of-view to ~15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole body PET acquisition protocol of ~45min total length is presented, composed of (i) an initial 6-min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (6 passes x 7 bed positions, each scanned for 45sec). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares (OLS) Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of 10 different clinically

  13. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application.

    Science.gov (United States)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-10-21

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ~15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ~45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  14. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    International Nuclear Information System (INIS)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-01-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ∼15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ∼45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate K i and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different

  15. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-10-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  16. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  17. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  18. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  19. Application of neutron transmutation doping method to initially p-type silicon material.

    Science.gov (United States)

    Kim, Myong-Seop; Kang, Ki-Doo; Park, Sang-Jun

    2009-01-01

    The neutron transmutation doping (NTD) method was applied to the initially p-type silicon in order to extend the NTD applications at HANARO. The relationship between the irradiation neutron fluence and the final resistivity of the initially p-type silicon material was investigated. The proportional constant between the neutron fluence and the resistivity was determined to be 2.3473x10(19)nOmegacm(-1). The deviation of the final resistivity from the target for almost all the irradiation results of the initially p-type silicon ingots was at a range from -5% to 2%. In addition, the burn-up effect of the boron impurities, the residual (32)P activity and the effect of the compensation characteristics for the initially p-type silicon were studied. Conclusively, the practical methodology to perform the neutron transmutation doping of the initially p-type silicon ingot was established.

  20. Bounding the per-protocol effect in randomized trials: An application to colorectal cancer screening

    NARCIS (Netherlands)

    S.A. Swanson (Sonja); Holme (Øyvind); M. Løberg (Magnus); M. Kalager (Mette); M. Bretthauer (Michael); G. Hoff (G.); E. Aas (Eline); M.A. Hernán (M.)

    2015-01-01

    textabstractBackground: The per-protocol effect is the effect that would have been observed in a randomized trial had everybody followed the protocol. Though obtaining a valid point estimate for the per-protocol effect requires assumptions that are unverifiable and often implausible, lower and upper

  1. An evaluation of safety culture initiatives at BNSF Railway

    Science.gov (United States)

    2015-04-01

    Major safety culture (SC) initiatives initiated in the FRA Office of Research, Technology and Development (RT&D), such as Clear Signal for Action (CSA), the Investigation of Safety Related Occurrences Protocol (ISROP), the Participative Safety Rules ...

  2. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  3. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

    Directory of Open Access Journals (Sweden)

    Tiago D. P. Mendes

    2015-07-01

    Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.

  4. Definition and specification of "CANlike" protocols in the context of wireless networks

    OpenAIRE

    Juanole , Guy; Mouney , Gérard

    2015-01-01

    Rapport LAAS n° 15276; The implementation of distributed real-time applications on wireless networks constitutes today a new important challenge and, in this context, the MAC protocols, which implement the frame exchange scheduling, have an essential role. This paper is precisely concerned by the specification of such MAC protocols. We specify MAC protocols called CANlike protocols because they are inspired by the MAC protocol of the network CAN which is a wired network. The presentation made...

  5. Protocol for Quantification of Defects in Natural Fibres for Composites

    DEFF Research Database (Denmark)

    Mortensen, Ulrich Andreas; Madsen, Bo

    2014-01-01

    Natural bast-type plant fibres are attracting increasing interest for being used for structural composite applications where high quality fibres with good mechanical properties are required. A protocol for the quantification of defects in natural fibres is presented. The protocol is based...

  6. Creating Open Digital Library Using XML Implementation of OAi-PMH Protocol at CERN

    CERN Document Server

    Vesely, M; Le Meur, Jean-Yves; Simko, Tibor

    2002-01-01

    This article describes the implementation of the OAi-PMH protocol within the CERN Document Server (CDS). In terms of the protocol, CERN acts both as a data provider and service provider and the two core applications are described. The application of XML Schema and XSLT technology is emphasized.

  7. Creating Open Digital Library Using XML: Implementation of OAi-PMH Protocol at CERN

    OpenAIRE

    Vesely, M; Baron, T; Le Meur, Jean-Yves; Simko, Tibor

    2002-01-01

    This article describes the implementation of the OAi-PMH protocol within the CERN Document Server (CDS). In terms of the protocol, CERN acts both as a data provider and service provider and the two core applications are described. The application of XML Schema and XSLT technology is emphasized.

  8. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  9. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  10. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    Science.gov (United States)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  11. A protocol to prevent and deal with aggressive behavior against health workers.

    Science.gov (United States)

    Altemir, María; Arteaga, Alfonso

    Violence against health workers is a highly prevalent phenomenon with serious psychological and labour consequences among professionals. This paper aims, first, to find out the main studies undertaken to date to describe and analyse the phenomenon, as well as to present different initiatives and protocols of action carried out. The second objective is to offer a procedure of action both to prevent aggression and to intervene in the event of receiving an aggression at work. After a bibliographic search in PubMed, Scopus and SciELO databases, the impact of the aggressions suffered by health professionals, the contexts in which aggressions are more frequent, their main consequences and different strategies and protocols conducted in Spain are reviewed. Given that rigorous reviews supporting such procedures are lacking in scientific journals, different action guidelines for professionals to prevent and to deal with hostile behaviour based on available evidence are developed and proposed. Finally, an easily consultable and applicable action procedure for health workers attacked in the workplace is presented. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  12. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-02-09

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997.

  13. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  14. Temporal Precedence Checking for Switched Models and its Application to a Parallel Landing Protocol

    Science.gov (United States)

    Duggirala, Parasara Sridhar; Wang, Le; Mitra, Sayan; Viswanathan, Mahesh; Munoz, Cesar A.

    2014-01-01

    This paper presents an algorithm for checking temporal precedence properties of nonlinear switched systems. This class of properties subsume bounded safety and capture requirements about visiting a sequence of predicates within given time intervals. The algorithm handles nonlinear predicates that arise from dynamics-based predictions used in alerting protocols for state-of-the-art transportation systems. It is sound and complete for nonlinear switch systems that robustly satisfy the given property. The algorithm is implemented in the Compare Execute Check Engine (C2E2) using validated simulations. As a case study, a simplified model of an alerting system for closely spaced parallel runways is considered. The proposed approach is applied to this model to check safety properties of the alerting logic for different operating conditions such as initial velocities, bank angles, aircraft longitudinal separation, and runway separation.

  15. Efficiency Improvement and Quality Initiatives Application in Financial Institutions

    Directory of Open Access Journals (Sweden)

    MSc. Ajtene Avdullahi

    2015-06-01

    Full Text Available Financial institutions in today’s economy have no longer the luxury to improve profit simply by increasing revenue. These firms, due to the significant measuring reductions in the financial services industry needed to improve operational efficiencies and merely support existing processes with fewer resources. This paper explains the benefits of Lean, Six Sigma, Total Quality Management and Lean Six Sigma that have improved organization's performance, by cutting costs and waste, improving their products or services, increasing profitability as well as enhancing customer satisfaction. The applicability of quality management practices in financial institutions in Kosovo is presented and also their efficiency and effectiveness. By analyzing data from Raiffeisen Bank Kosovo, this paper highlights the benefits of Individual and Micro companies customer segment as the result of organizational change and successful application of quality initiatives from financial institutions in Kosovo.

  16. Application of an access technology delivery protocol to two children with cerebral palsy.

    Science.gov (United States)

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  17. The introduction of a protocol for the use of biobrane for facial burns in children.

    Science.gov (United States)

    Rogers, A D; Adams, S; Rode, H

    2011-01-01

    BIOBRANE HAS BECOME AN INDISPENSIBLE DRESSING WITH THREE ESTABLISHED INDICATIONS IN ACUTE BURNS CARE AT OUR INSTITUTION: (1) as the definitive dressing of superficial partial thickness facial burns, (2) after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3) for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  18. Performances of different protocols for exocellular polysaccharides extraction from milk acid gels: Application to yogurt.

    Science.gov (United States)

    Nguyen, An Thi-Binh; Nigen, Michaël; Jimenez, Luciana; Ait-Abderrahim, Hassina; Marchesseau, Sylvie; Picart-Palmade, Laetitia

    2018-01-15

    Dextran or xanthan were used as model exocellular polysaccharides (EPS) to compare the extraction efficiency of EPS from skim milk acid gels using three different protocols. Extraction yields, residual protein concentrations and the macromolecular properties of extracted EPS were determined. For both model EPS, the highest extraction yield (∼80%) was obtained when samples were heated in acidic conditions at the first step of extraction (Protocol 1). Protocols that contained steps of acid/ethanol precipitation without heating (Protocols 2 and 3) show lower extraction yields (∼55%) but allow a better preservation of the EPS macromolecular properties. Changing the pH of acid gels up to 7 before extraction (Protocol 3) improved the extraction yield of anionic EPS without effect on the macromolecular properties of EPS. Protocol 1 was then applied for the quantification of EPS produced during the yogurt fermentation, while Protocol 3 was dedicated to their macromolecular characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  20. The studsvik BNCT project: structure and the proposed protocols

    International Nuclear Information System (INIS)

    Capala, J.; Stenstam, B.H.; Skoeld, K.; Henriksson, R.; Salford, L.; Carlsson, J.

    2000-01-01

    The BNCT facility at Studsvik is now ready for clinical trials. Scientific operations of the Studsvik BNCT project are overseen by the Scientific Advisory Board comprised of representatives of all major universities in Sweden. Furthermore, special task groups for clinical and preclinical studies have been formed to facilitate collaboration with academia and to assure the quality of the research. Proposed clinical Phase II trials for glioblastoma are sponsored by the Swedish National Neuro-Oncology Group and, initially, will involve two protocols: Protocol no.1. BNCT for glioblastoma patients who have not received any therapy other than surgery (including stereotactic biopsy only). Protocol no.2. BNCT as a palliative treatment for patients with recurrent glioblastoma following conventional therapies or BNCT. In both protocols, BPA, administered by a 6 hour i.v. infusion, will be used as the boron delivery agent. (author)

  1. Medical Student Perceptions of Learner-Initiated Feedback Using a Mobile Web Application

    Directory of Open Access Journals (Sweden)

    Amy C Robertson

    2017-12-01

    Full Text Available Feedback, especially timely, specific, and actionable feedback, frequently does not occur. Efforts to better understand methods to improve the effectiveness of feedback are an important area of educational research. This study represents preliminary work as part of a plan to investigate the perceptions of a student-driven system to request feedback from faculty using a mobile device and Web-based application. We hypothesize that medical students will perceive learner-initiated, timely feedback to be an essential component of clinical education. Furthermore, we predict that students will recognize the use of a mobile device and Web application to be an advantageous and effective method when requesting feedback from supervising physicians. Focus group data from 18 students enrolled in a 4-week anesthesia clerkship revealed the following themes: (1 students often have to solicit feedback, (2 timely feedback is perceived as being advantageous, (3 feedback from faculty is perceived to be more effective, (4 requesting feedback from faculty physicians poses challenges, (5 the decision to request feedback may be influenced by the student’s clinical performance, and (6 using a mobile device and Web application may not guarantee timely feedback. Students perceived using a mobile Web-based application to initiate feedback from supervising physicians to be a valuable method of assessment. However, challenges and barriers were identified.

  2. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  3. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  4. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  5. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  6. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  7. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  8. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  9. Protocol for Validation of the Land Surface Reflectance Fundamental Climate Data Record using AERONET: Application to the Global MODIS and VIIRS Data Records

    Science.gov (United States)

    Roger, J. C.; Vermote, E.; Holben, B. N.

    2014-12-01

    The land surface reflectance is a fundamental climate data record at the basis of the derivation of other climate data records (Albedo, LAI/Fpar, Vegetation indices) and a key parameter in the understanding of the land-surface-climate processes. It is essential that a careful validation of its uncertainties is performed on a global and continuous basis. One approach is the direct comparison of this product with ground measurements but that approach presents several issues related to scale, the episodic nature of ground measurements and the global representativeness. An alternative is to compare the surface reflectance product to reference reflectance determined from Top of atmosphere reflectance corrected using accurate radiative transfer code and very detailed measurements of the atmosphere obtained over the AERONET sites (Vermote and al, 2014, RSE) which allows to test for a large range of aerosol characteristics; formers being important inputs for atmospheric corrections. However, the application of this method necessitates the definition of a very detailed protocol for the use of AERONET data especially as far as size distribution and absorption are concerned, so that alternative validation methods or protocols could be compared. This paper describes the protocol we have been working on based on our experience with the AERONET data and its application to the MODIS and VIIRS record.

  10. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  11. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  12. The Operation of the Joint Protocol: Theoretical and Practical Implications Revisited

    International Nuclear Information System (INIS)

    Horbach, N.

    2008-01-01

    On 21 September 1988, a Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted and entered into force on 27 April 1992. The 1988 Joint Protocol (Article II) provides for a mutual extension of the operator's liability under the Paris and Vienna systems: thus, if a nuclear incident occurs for which an operator is liable under both the Vienna Convention and the Joint Protocol, he shall be liable in accordance with the Vienna Convention for nuclear damage suffered not only in the territory of Parties thereto, but also in the territory of Parties to both the Paris Convention and the Joint Protocol; conversely, if an incident occurs for which an operator is liable under both the Paris Convention and the Joint Protocol, there shall be reciprocity. Moreover, the Joint Protocol (Article III) eliminates conflicts of law which might otherwise arise, especially in transport cases, from simultaneous application of the two Conventions. Although the text of the Joint Protocol is quite straightforward, it still has led to different interpretations in legal doctrine concerning Article IV. The main concern is the conflict that might arise in respect of the appropriate designation of the competent court and applicable law in situations were courts of different states might claim exclusive jurisdiction. This depends also on whether the Joint Protocol should be interpreted as eliminating the distinction between Contracting Parties and non-Contracting Parties in respect of the 'functional' relations among Paris and Vienna Contracting Parties, also party to the Joint Protocol, as far as the operative provisions of both Conventions listed in Article IV are concerned (including the provisions on jurisdictional competence). The importance of finding the legally correct interpretation, already complicated in relation to the interpretation of the operation of the Joint Protocol under the unrevised nuclear liability treaties (1960 Paris

  13. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  14. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  15. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    OpenAIRE

    Zhang, Liping; Tang, Shanyu; Zhu, Shaohui

    2016-01-01

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from t...

  16. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Alasdair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer Rhodes [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rosewater, David Martin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-04-01

    This Protocol provides a set of “best practices” for characterizing energy storage systems (ESSs) and measuring and reporting their performance. It serves as a basis for assessing how an ESS will perform with respect to key performance attributes relevant to different applications. It is intended to provide a valid and accurate basis for the comparison of different ESSs. By achieving the stated purpose, the Protocol will enable more informed decision-making in the selection of ESSs for various stationary applications. The Protocol identifies general information and technical specifications relevant in describing an ESS and also defines a set of test, measurement, and evaluation criteria with which to express the performance of ESSs that are intended for energy-intensive and/or power-intensive stationary applications. An ESS includes a storage device, battery management system, and any power conversion systems installed with the storage device. The Protocol is agnostic with respect to the storage technology and the size and rating of the ESS. The Protocol does not apply to single-use storage devices and storage devices that are not coupled with power conversion systems, nor does it address safety, security, or operations and maintenance of ESSs, or provide any pass/fail criteria.

  17. Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

    Directory of Open Access Journals (Sweden)

    Majid Mumtaz

    2016-10-01

    Full Text Available Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509 certificates. The system uses Public Key Infrastructure (PKI, challenge/response protocol, mobile proxy servers, and Java cards with crypto capabilities used as a Secure Element. Innovative design of the protocol, its implementation, and evaluation results are described. In addition to end-user authentication, the described solution also supports the use of X.509 certificates for additional security services – confidentiality, integrity, and non-repudiation of transactions and data in an open network environment. The system uses Application Programming Interfaces (APIs to access Java cards functions and credentials that can be used as add-ons to enhance any mobile application with security features and services.

  18. Byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems

    Science.gov (United States)

    Malekpour, Mahyar R. (Inventor)

    2010-01-01

    A rapid Byzantine self-stabilizing clock synchronization protocol that self-stabilizes from any state, tolerates bursts of transient failures, and deterministically converges within a linear convergence time with respect to the self-stabilization period. Upon self-stabilization, all good clocks proceed synchronously. The Byzantine self-stabilizing clock synchronization protocol does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period.

  19. A VXI-GPIB protocol converter based on DSP

    International Nuclear Information System (INIS)

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  20. An Optimized WSN Design for Latency-Critical Smart Grid Applications

    Directory of Open Access Journals (Sweden)

    Mounib Khanafer

    2017-01-01

    Full Text Available The growing popularity of the Internet of Things (IoT systems such as the smart grid, Body Area Networks (BANs, and the Intelligent Transportation System (ITS is driving Wireless Sensor Network (WSN systems to the limit in terms of abilities and performance. WSNs were initially designed for low power, low data rate, and latency-tolerant applications. However, this paradigm is changing because of the nature of the new applications. Therefore, instead of only focusing on power-efficient WSN design, researchers and industries are now developing Quality of Service (QoS protocols for WSNs. In addition to that, latency- and reliability-critical protocol designs are also becoming significantly important in WSNs. In this paper, we present an overview of some important smart grid latency-critical applications and highlight WSNs implementation challenges for these smart grid applications. Furthermore, we develop and evaluate two novel optimization models that solve for the optimum values of the end-to-end latency and power consumption in a clustered WSN given lower bounds on reliability and other network parameters.

  1. Applicability of initial stress measurement methods to Horonobe Siliceous rocks and initial stress state around Horonobe Underground Research Laboratory

    International Nuclear Information System (INIS)

    Sanada, Hiroyuki; Niunoya, Sumio; Matsui, Hiroya; Fujii, Yoshiaki

    2009-01-01

    Understanding initial stress condition in deep underground is important for such construction as rock cavern for geological disposal of HLW and underground power plant. Neogene sedimentary rock is widely distributed in Japan. There are only a few studies of initial stress measurement in Neogene sedimentary rock mass in Japan due to difficulty of measurement. Evaluation of initial stress condition around Horonobe Underground Research Laboratory Project was carried out in order to understand initial stress condition and applicability of AE, DSCA and hydraulic fracturing (HF) methods to Neogene sedimentary rock. Initial stress values obtained from AE method is smaller than overburden pressure due to time dependency of Kaizer effect. It would be difficult to use AE method as initial stress measurement method for Horonobe Siliceous rocks. Principal stress values by DSCA are similar to those by HF tests. Directions of maximum horizontal principal stresses are approximately in E-W and corresponded to HF results. In HF, rod type and wire-line type systems were compared. Workability of rod type was much better than wire-line type. However, re-opening pressure were not able to be precisely measured in case of rod type system due to the large compliance of the packers and rods. Horizontal maximum and minimum principal stresses increase linearly in HF results. Deviatoric stress is acting at shallow depth. Initial stress condition approaches hydrostatic condition with depth. Direction of maximum horizontal principal stress was in E-W direction which was similar to tectonic movement around Horonobe URL by triangular surveying. (author)

  2. Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 11 June 1998. It was signed in Vienna on 12 June 1998

  3. Assessing impacts of roads: application of a standard assessment protocol

    Science.gov (United States)

    Duniway, Michael C.; Herrick, Jeffrey E.

    2013-01-01

    Adaptive management of road networks depends on timely data that accurately reflect the impacts those systems are having on ecosystem processes and associated services. In the absence of reliable data, land managers are left with little more than observations and perceptions to support management decisions of road-associated disturbances. Roads can negatively impact the soil, hydrologic, plant, and animal processes on which virtually all ecosystem services depend. The Interpreting Indicators of Rangeland Health (IIRH) protocol is a qualitative method that has been demonstrated to be effective in characterizing impacts of roads. The goal of this study were to develop, describe, and test an approach for using IIRH to systematically evaluate road impacts across large, diverse arid and semiarid landscapes. We developed a stratified random sampling approach to plot selection based on ecological potential, road inventory data, and image interpretation of road impacts. The test application on a semiarid landscape in southern New Mexico, United States, demonstrates that the approach developed is sensitive to road impacts across a broad range of ecological sites but that not all the types of stratification were useful. Ecological site and road inventory strata accounted for significant variability in the functioning of ecological processes but stratification based on apparent impact did not. Analysis of the repeatability of IIRH applied to road plots indicates that the method is repeatable but consensus evaluations based on multiple observers should be used to minimize risk of bias. Landscape-scale analysis of impacts by roads of contrasting designs (maintained dirt or gravel roads vs. non- or infrequently maintained roads) suggests that future travel management plans for the study area should consider concentrating traffic on fewer roads that are well designed and maintained. Application of the approach by land managers will likely provide important insights into

  4. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  5. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  6. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  7. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  8. Science Initiatives of the US Virtual Astronomical Observatory

    Science.gov (United States)

    Hanisch, R. J.

    2012-09-01

    The United States Virtual Astronomical Observatory program is the operational facility successor to the National Virtual Observatory development project. The primary goal of the US VAO is to build on the standards, protocols, and associated infrastructure developed by NVO and the International Virtual Observatory Alliance partners and to bring to fruition a suite of applications and web-based tools that greatly enhance the research productivity of professional astronomers. To this end, and guided by the advice of our Science Council (Fabbiano et al. 2011), we have focused on five science initiatives in the first two years of VAO operations: 1) scalable cross-comparisons between astronomical source catalogs, 2) dynamic spectral energy distribution construction, visualization, and model fitting, 3) integration and periodogram analysis of time series data from the Harvard Time Series Center and NASA Star and Exoplanet Database, 4) integration of VO data discovery and access tools into the IRAF data analysis environment, and 5) a web-based portal to VO data discovery, access, and display tools. We are also developing tools for data linking and semantic discovery, and have a plan for providing data mining and advanced statistical analysis resources for VAO users. Initial versions of these applications and web-based services are being released over the course of the summer and fall of 2011, with further updates and enhancements planned for throughout 2012 and beyond.

  9. Science Initiatives of the US Virtual Astronomical Observatory

    Directory of Open Access Journals (Sweden)

    Hanisch Robert J.

    2012-09-01

    Full Text Available The United States Virtual Astronomical Observatory program is the operational facility successor to the National Virtual Observatory development project. The primary goal of the US VAO is to build on the standards, protocols, and associated infrastructure developed by NVO and the International Virtual Observatory Alliance partners and to bring to fruition a suite of applications and web-based tools that greatly enhance the research productivity of professional astronomers. To this end, and guided by the advice of our Science Council (advisory committee, we are focusing on five science initiatives in the first two years of VAO operations: (1 scalable cross-comparisons between astronomical source catalogs, (2 dynamic spectral energy distribution construction, visualization, and model fitting, (3 integration and periodogram analysis of time series data from the Harvard Time Series Center and NASA Star and Exoplanet Database, (4 integration of VO data discovery and access tools into the IR AF data analysis environment, and (5 a web-based portal to VO data discovery, access, and display tools. We are also developing tools for data linking and semantic discovery, and have a plan for providing data mining and advanced statistical analysis resources for VAO users. Initial versions of these applications and web-based services are being released over the course of the summer and fall of 2011, with further updates and enhancements planned for throughout 2012 and beyond.

  10. The radiological monitoring protocol for metallic products and cleared scrap management

    International Nuclear Information System (INIS)

    Gil Lopez, E.

    2003-01-01

    Event though the use of nuclear and radiological techniques is subject to strict controls in most countries, the presence of radioactive material in batches of metallic scrap has been detected with relative frequency in the last few years. This circumstance has motivated the implementation of a series of national and international initiatives aimed at detecting and preventing this type of events, whether they be intentional or involuntary. The Spanish iron and steel industry is one of the country's most important industrial sectors, and to a great extent it depends on the importation of a very significant amount of metallic scrap that it uses as raw material. Experience has shown that countries that import large amounts of scrap, apart from supporting the mentioned international initiatives, should complement them with other national initiatives to reduce the risks resulting from the presence of radioactive material in scrap. In this context, the Spanish authorities, together with trade unions and entrepreneurial associations in the metal reclamations and smelting sectors and ENRESA, have signed a voluntary Protocol that defines and implements a national radiological monitoring and control system for scrap materials and their byproducts. The Protocol defines the obligations and rights of the signatories, and it describes the monitoring and control system and its legal bases, the operation of both specific and other general-purpose radiological monitoring equipment that existed prior to this initiative, the development of radiological training and dissemination plans for professionals in the metal reclamation and smelting sectors, the establishment of effective systems for the safe management of any radioactive materials detected, and the general improvement of the national response system in the event of radiological emergencies. Since the Protocol took effect in November 1999, more than 100 enterprises from the metallurgical (steel, copper, lead and aluminum

  11. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  12. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  13. A Quantum Private Query Protocol for Enhancing both User and Database Privacy

    Science.gov (United States)

    Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang

    2018-01-01

    In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016

  14. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  15. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  16. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  17. The Design of Finite State Machine for Asynchronous Replication Protocol

    Science.gov (United States)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  18. Ontology-based configuration of problem-solving methods and generation of knowledge-acquisition tools: application of PROTEGE-II to protocol-based decision support.

    Science.gov (United States)

    Tu, S W; Eriksson, H; Gennari, J H; Shahar, Y; Musen, M A

    1995-06-01

    PROTEGE-II is a suite of tools and a methodology for building knowledge-based systems and domain-specific knowledge-acquisition tools. In this paper, we show how PROTEGE-II can be applied to the task of providing protocol-based decision support in the domain of treating HIV-infected patients. To apply PROTEGE-II, (1) we construct a decomposable problem-solving method called episodic skeletal-plan refinement, (2) we build an application ontology that consists of the terms and relations in the domain, and of method-specific distinctions not already captured in the domain terms, and (3) we specify mapping relations that link terms from the application ontology to the domain-independent terms used in the problem-solving method. From the application ontology, we automatically generate a domain-specific knowledge-acquisition tool that is custom-tailored for the application. The knowledge-acquisition tool is used for the creation and maintenance of domain knowledge used by the problem-solving method. The general goal of the PROTEGE-II approach is to produce systems and components that are reusable and easily maintained. This is the rationale for constructing ontologies and problem-solving methods that can be composed from a set of smaller-grained methods and mechanisms. This is also why we tightly couple the knowledge-acquisition tools to the application ontology that specifies the domain terms used in the problem-solving systems. Although our evaluation is still preliminary, for the application task of providing protocol-based decision support, we show that these goals of reusability and easy maintenance can be achieved. We discuss design decisions and the tradeoffs that have to be made in the development of the system.

  19. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  20. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  1. Safeguards agreement and additional protocol - IAEA instruments for control of nuclear materials distribution and their application in Tajikistan

    International Nuclear Information System (INIS)

    Nasrulloev, Kh.; Mirsaidov, U.

    2010-01-01

    -proliferation regime. For strengthening of nuclear materials non-proliferation regime it is necessary to: strengthen safeguards; more effective export control and efforts on black market network liquidation; effective activities on search of orphan sources; efforts exhorting demand reduce for nuclear weapons. For safeguards strengthening it is necessary to conduct annual IAEA inspections. Taking into account that Additional protocol provides to IAEA considerably more wide access to information and IAEA should make use of its privileges. Some countries signed Nuclear weapon non-proliferation treaty but unfortunately didn't signed Safeguards Agreement and Additional Protocol. That's why Additional Protocol should be ratified by all countries, which can be universal standard of nuclear inspection. Provider states should make Additional protocol as condition for license issuance on nuclear materials, services and technology export. Tajikistan provides necessary information to IAEA in accordance with Additional Protocol: location where nuclear material is available or might be available; information about all buildings where nuclear material could be available; ready to provide assistance for IAEA missions on environmental sampling; provides to IAEA inspectors multiple visas; information about scientific and research works. Exclusive importance for IAEA safeguards agreement is high safeguards culture. IAEA should regularly conduct seminars on advanced assessment of safeguards culture - exactly as recommends to nuclear sites regularly to assess safety culture, and to undertake steps on elimination of any revealed shortcomings. One of the important safeguards criteria is nuclear knowledge preservation. IAEA member-states should advocate initiative on attraction and next generation specialists training and provide them a stimulus to make a carrier in IAEA. Important safeguards element is more effective export control and efforts to liquidate black markets network. The experience

  2. Bell nonlocality: a resource for device-independent quantum information protocols

    Science.gov (United States)

    Acin, Antonio

    2015-05-01

    Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.

  3. A Protocol for Advanced Psychometric Assessment of Surveys

    Science.gov (United States)

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  4. Model-Checking Web Services Business Activity Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2013-01-01

    Web Services Business Activity specification defines two coordination protocols BAwCC (Business Agreement with Coordination Completion) and BAwPC (Business Agreement with Participant Completion)that ensure a consistent agreement on the outcome of long-running distributed applications. In order...

  5. Throughput and Fairness of Collision Avoidance Protocols in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Garcia-Luna-Aceves, J. J; Wang, Yu

    2004-01-01

    .... In Section 1, The authors present an analytical modeling to derive the saturation throughput of these sender-initiated collision avoidance protocols in multi-hop ad hoc networks with nodes randomly...

  6. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  7. Optimal protocols for Hamiltonian and Schrödinger dynamics

    International Nuclear Information System (INIS)

    Schmiedl, Tim; Dieterich, Eckhard; Dieterich, Peter-Simon; Seifert, Udo

    2009-01-01

    For systems in an externally controllable time dependent potential, the optimal protocol minimizes the mean work spent in a finite time transition between given initial and final values of a control parameter. For an initially thermalized ensemble, we consider both Hamiltonian evolution for classical systems and Schrödinger evolution for quantum systems. In both cases, we show that for harmonic potentials, the optimal work is given by the adiabatic work even in the limit of short transition times. This result is counter-intuitive because the adiabatic work is substantially smaller than the work for an instantaneous jump. We also perform numerical calculations for the optimal protocol for Hamiltonian dynamics in an anharmonic quartic potential. For a two-level spin system, we give examples where the adiabatic work can be reached in either a finite or an arbitrarily short transition time depending on the allowed parameter space

  8. A review of tags anti-collision and localization protocols in RFID networks.

    Science.gov (United States)

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  9. The impact of an ED-only full-capacity protocol.

    Science.gov (United States)

    Watase, Taketo; Fu, Rongwei; Foster, Denise; Langley, Denise; Handel, Daniel A

    2012-10-01

    The objective of this study was to assess the impact of an emergency department (ED)-only full-capacity protocol and diversion, controlling for patient volumes and other potential confounding factors. This was a preintervention and postintervention cohort study using data 12 months before and 12 months after the implementation of the protocol. During the implementation period, attending physicians and charge nurses were educated with clear and simple figures on the criteria for the initiation of the new protocol. A multiple logistic regression model was used to compare ambulance diversion between the 2 periods. The proportion of days when the ED went on diversion at least once during a 24-hour period was 60.4% during the preimplementation period and 20% in the postimplementation periods (P model, the use of the new protocol was significantly associated with decreased odds of diversion rate in the postimplementation period (odds ratio, 0.32; 95% confidence interval, 0.21-0.48). Our predivert/full-capacity protocol is a simple and generalizable strategy that can be implemented within the boundaries of the ED and is significantly associated with a decreased diversion rate. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Protocol Additional to the agreement between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Canada written notification that Canada's statutory and/or constitutional requirements for entry into force have been met, i.e. on 8 September 2000

  11. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  12. Evaluation of Quality Assessment Protocols for High Throughput Genome Resequencing Data.

    Science.gov (United States)

    Chiara, Matteo; Pavesi, Giulio

    2017-01-01

    Large-scale initiatives aiming to recover the complete sequence of thousands of human genomes are currently being undertaken worldwide, concurring to the generation of a comprehensive catalog of human genetic variation. The ultimate and most ambitious goal of human population scale genomics is the characterization of the so-called human "variome," through the identification of causal mutations or haplotypes. Several research institutions worldwide currently use genotyping assays based on Next-Generation Sequencing (NGS) for diagnostics and clinical screenings, and the widespread application of such technologies promises major revolutions in medical science. Bioinformatic analysis of human resequencing data is one of the main factors limiting the effectiveness and general applicability of NGS for clinical studies. The requirement for multiple tools, to be combined in dedicated protocols in order to accommodate different types of data (gene panels, exomes, or whole genomes) and the high variability of the data makes difficult the establishment of a ultimate strategy of general use. While there already exist several studies comparing sensitivity and accuracy of bioinformatic pipelines for the identification of single nucleotide variants from resequencing data, little is known about the impact of quality assessment and reads pre-processing strategies. In this work we discuss major strengths and limitations of the various genome resequencing protocols are currently used in molecular diagnostics and for the discovery of novel disease-causing mutations. By taking advantage of publicly available data we devise and suggest a series of best practices for the pre-processing of the data that consistently improve the outcome of genotyping with minimal impacts on computational costs.

  13. Protocol for uniformly measuring and expressing the performance of energy storage systems.

    Energy Technology Data Exchange (ETDEWEB)

    Ferreira, Summer Kamal Rhodes; Rose, David Martin; Schoenwald, David A; Bray, Kathy; Conover, David; Kintner-Meyer, Michael; Viswanathan, Vilayanur

    2013-08-01

    The U.S. Department of Energys Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of ESSs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs to make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  14. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bray, Kathryn L.; Conover, David R.; Kintner-Meyer, Michael CW; Viswanathan, Vijayganesh; Ferreira, Summer; Rose, David; Schoenwald, David

    2012-10-01

    The U.S. Department of Energy’s Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of EESs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  15. Maine Tidal Power Initiative: Environmental Impact Protocols For Tidal Power

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Michael Leroy [Univ. of Maine, Orono, ME; Zydlewski, Gayle Barbin [Univ. of Maine, Orono, ME; Xue, Huijie [Univ. of Maine, Orono, ME; Johnson, Teresa R. [Univ. of Maine, Orono, ME

    2014-02-02

    The Maine Tidal Power Initiative (MTPI), an interdisciplinary group of engineers, biologists, oceanographers, and social scientists, has been conducting research to evaluate tidal energy resources and better understand the potential effects and impacts of marine hydro-kinetic (MHK) development on the environment and local community. Project efforts include: 1) resource assessment, 2) development of initial device design parameters using scale model tests, 3) baseline environmental studies and monitoring, and 4) human and community responses. This work included in-situ measurement of the environmental and social response to the pre-commercial Turbine Generator Unit (TGU®) developed by Ocean Renewable Power Company (ORPC) as well as considering the path forward for smaller community scale projects.

  16. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  17. WelFur - mink: development of on-farm welfare assessment protocols for mink

    DEFF Research Database (Denmark)

    Møller, Steen Henrik; Hansen, Steffen W; Rousing, Tine

    2012-01-01

    European Fur Breeder's Association initiated the "WelFur" project in 2009 in order to develop a welfare assessment protocol for mink and fox farms after the Welfare Quality® standards. The assessment is based on four welfare principles (Good feeding, good housing, good health and appropriate beha...... mink production seasons: Winter, spring, and autumn, in order to cover the life cycle of mink and proved feasible for a one-day visit.......European Fur Breeder's Association initiated the "WelFur" project in 2009 in order to develop a welfare assessment protocol for mink and fox farms after the Welfare Quality® standards. The assessment is based on four welfare principles (Good feeding, good housing, good health and appropriate...

  18. Intervening to promote early initiation of breastfeeding in the LDR.

    Science.gov (United States)

    Komara, Carol; Simpson, Diana; Teasdale, Carla; Whalen, Gaye; Bell, Shay; Giovanetto, Laurie

    2007-01-01

    To evaluate the effectiveness of an interventional protocol for the early initiation of breastfeeding that would remove barriers in the labor, delivery, recovery (LDR) unit. Descriptive design using 100 postpartum mothers who were interviewed before discharge at a large university hospital in the south-central United States. Descriptive statistics were used for analysis. The protocol was effective for initiating breastfeeding, and breastfeeding increased from 53% to 66%. When barriers to breastfeeding are reduced in the LDR setting, women will breastfeed. It is possible that reducing hospital barriers to breastfeeding in the LDR can also set the stage for sustained breastfeeding during hospitalization and for less supplementation with formula.

  19. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  20. The Applications of Gold Nanoparticle-Initialed Chemiluminescence in Biomedical Detection

    Science.gov (United States)

    Liu, Zezhong; Zhao, Furong; Gao, Shandian; Shao, Junjun; Chang, Huiyun

    2016-10-01

    Chemiluminescence technique as a novel detection method has gained much attention in recent years owning to the merits of high sensitivity, wider linear ranges, and low background signal. Similarly, nanotechnology especially for gold nanoparticles has emerged as detection tools due to their unique physical and chemical properties. Recently, it has become increasingly popular to couple gold nanoparticles with chemiluminescence technique in biological agents' detection. In this review, we describe the superiority of both chemiluminescence and gold nanoparticles and conclude the different applications of gold nanoparticle-initialed chemiluminescence in biomedical detection.

  1. Protocol compliance and time management in blunt trauma resuscitation.

    Science.gov (United States)

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  2. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    Energy Technology Data Exchange (ETDEWEB)

    Busby, Jeremy T [ORNL

    2009-05-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  3. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    International Nuclear Information System (INIS)

    Busby, Jeremy T.

    2009-01-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  4. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  5. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  6. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    Science.gov (United States)

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  7. Plasma Discharge Initiation of Explosives in Rock Blasting Application: A Case Study

    International Nuclear Information System (INIS)

    Chae, Jae-Ou; Jeong, Young-Jun; Shmelev, V M; Denicaev, A A; Poutchkov, V M; Ravi, V

    2006-01-01

    A plasma discharge initiation system for the explosive volumetric combustion charge was designed, investigated and developed for practical application. Laboratory scale experiments were carried out before conducting the large scale field tests. The resultant explosions gave rise to less noise, insignificant seismic vibrations and good specific explosive consumption for rock blasting. Importantly, the technique was found to be safe and environmentally friendly

  8. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  9. Controlled initialization of superconducting π-phaseshifters and possible applications

    International Nuclear Information System (INIS)

    Mielke, Olaf; Ortlepp, Thomas; Toepfer, Hannes; Kunert, Juergen; Meyer, Hans-Georg

    2010-01-01

    The rapid single-flux quantum electronics (RSFQ) is a superconducting, naturally digital circuit family which is currently close to being commercially applied. RSFQ is outstanding because of its very low switching energy resulting in very low power consumption. This advantage causes, however, a significant influence of thermal noise. For industrial applications, a certain noise immunity is required which is still a challenge, especially for circuits of higher complexity. Integrating phase-shifting elements is a new concept for further improvements concerning stability against the influence of thermal noise. We have already shown that the implementation of phase-shifting elements significantly reduces the influence of thermal noise on circuit behavior by experimentally analyzing the bit-error rate (Mielke et al 2009 IEEE Trans. Appl. Supercond. 19 621-5). Concepts which are easily implementable in standard niobium technology are especially promising. The π-phaseshifter consists of a superconducting loop which is able to store a single flux quantum. The loop current related to the stored flux creates a well-defined phase shift. To achieve the correct functionality of complex circuits it is essential to store exactly one flux quantum in each π-phaseshifter during the cooling down of the chip. Thus, for studying the feasibility of this new approach, the initialization reliability of the π-phaseshifter needs to be verified. We present an experimental investigation of this reliability to obtain a general assessment for the application of the π-phaseshifter in niobium technology. Furthermore, we compare the configuration shielded by a solid ground plane with a configuration with a ground-plane hole below the π-phaseshifter. Justified by the experimental results we suggest programmable RSFQ circuits based on π-phaseshifters. The characteristics of these devices can be influenced by a controlled initialization of the π-phaseshifter. The fabrication was performed by

  10. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  11. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  12. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  13. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003

  14. Protocol Additional to the agreement between the Republic of Palau and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Palau and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 10 May 2005 in New York and 13 May 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 13 May 2005, upon signature by the representatives of Palau and the Agency

  15. Protocol Additional to the Agreement Between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed in Vienna on 27 September 2007. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 27 September 2007, upon signature by the representatives of Burundi and the Agency

  16. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003.

  17. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003.

  18. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  19. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  20. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna [es

  1. Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 14 September 2004. It was signed on 9 December 2004 in Vienna

  2. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  3. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  4. Report: demonstrable progresses of the France according the Kyoto protocol; Rapport: progres demontrables de la France selon le protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-06-15

    This document constitutes the report of the France on the demonstrable progresses according the application of the 3 article of the Kyoto protocol. The first chapter is a description of the french climatic policy, as the second presents the tendencies and the projections concerning the greenhouse effect gases emissions. The chapter 3 details the policies effects and the measures ( energy, transport, industry and wastes). The last chapter is devoted to the respect of the other engagements articles 10 and 11 of the Kyoto protocol. (A.L.B.)

  5. Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Choi Hyoung-Kee

    2011-01-01

    Full Text Available Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, we present a secure yet efficient protocol for a VANET that satisfies these security requirements. Although much research has attempted to address similar issues, we contend that our proposed protocol outperforms other proposals that have been advanced. This claim is based on observations that show that the proposed protocol has such strengths as light computational load, efficient storage management, and dependability.

  6. Variability and Comprehensiveness of North American Online Available Physical Therapy Protocols Following Hip Arthroscopy for Femoroacetabular Impingement and Labral Repair.

    Science.gov (United States)

    Cvetanovich, Gregory L; Lizzio, Vincent; Meta, Fabien; Chan, Derek; Zaltz, Ira; Nho, Shane J; Makhni, Eric C

    2017-11-01

    To assess comprehensiveness and variability of postoperative physical therapy protocols published online following hip arthroscopy for femoroacetabular impingement (FAI) and/or labral repair. Surgeons were identified by the International Society for Hip Arthroscopy "Find a Surgeon" feature in North America (http://www.isha.net/members/, search August 10, 2016). Exclusion criteria included nonsurgeons and protocols for conditions other than hip arthroscopy for FAI and/or labral tear. Protocols were identified by review of surgeons' personal and departmental websites and evaluated for postoperative restrictions, rehabilitation components, and the time points for ending restrictions and initiating activities. Of 111 surgeons available online, 31 (27.9%) had postoperative hip arthroscopy physical therapy protocols available online. Bracing was used in 54.8% (17/31) of protocols for median 2-week duration (range, 1-6 weeks). Most protocols specified the initial postoperative weight-bearing status (29/31, 93.5%), most frequently partial weight-bearing with 20 pounds foot flat (20/29, 69.0%). The duration of weight-bearing restriction was median 3 weeks (range, 2-6) for FAI and median 6 weeks (range, 3-8) for microfracture. The majority of protocols specified initial range of motion limitations (26/31, 83.9%) for median 3 weeks (range, 1.5-12). There was substantial variation in the rehabilitation activities and time points for initiating activities. Time to return to running was specified by 20/31 (64.5%) protocols at median 12 weeks (range, 6-19), and return to sport timing was specified by 13/31 (41.9%) protocols at median 15.5 weeks (range, 9-23). There is considerable variability in postoperative physical therapy protocols available online following hip arthroscopy for FAI, including postoperative restrictions, rehabilitation activities, and time points for activities. This information offers residents, fellows, and established hip arthroscopists a centralized

  7. The Promises and Challenges of Ecological Momentary Assessment in Schizophrenia: Development of an Initial Experimental Protocol

    Directory of Open Access Journals (Sweden)

    Brandon A. Gaudiano

    2015-07-01

    Full Text Available Severe mental illnesses, including schizophrenia and other psychotic-spectrum disorders, are a major cause of disability worldwide. Although efficacious pharmacological and psychosocial interventions have been developed for treating patients with schizophrenia, relapse rates are high and long-term recovery remains elusive for many individuals. Furthermore, little is still known about the underlying mechanisms of these illnesses. Thus, there is an urgent need to better understand the contextual factors that contribute to psychosis so that they can be better targeted in future interventions. Ecological Momentary Assessment (EMA is a dynamic procedure that permits the measurement of variables in natural settings in real-time through the use of brief assessments delivered via mobile electronic devices (i.e., smartphones. One advantage of EMA is that it is less subject to retrospective memory biases and highly sensitive to fluctuating environmental factors. In the current article, we describe the research-to-date using EMA to better understand fluctuating symptoms and functioning in patients with schizophrenia and other psychotic disorders and potential applications to treatment. In addition, we describe a novel EMA protocol that we have been employing to study the outcomes of patients with schizophrenia following a hospital discharge. We also report the lessons we have learned thus far using EMA methods in this challenging clinical population.

  8. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    Science.gov (United States)

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  9. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  10. Quality and Variability of Online Available Physical Therapy Protocols From Academic Orthopaedic Surgery Programs for Anterior Cruciate Ligament Reconstruction.

    Science.gov (United States)

    Makhni, Eric C; Crump, Erica K; Steinhaus, Michael E; Verma, Nikhil N; Ahmad, Christopher S; Cole, Brian J; Bach, Bernard R

    2016-08-01

    To assess the quality and variability found across anterior cruciate ligament (ACL) rehabilitation protocols published online by academic orthopaedic programs. Web-based ACL physical therapy protocols from United States academic orthopaedic programs available online were included for review. Main exclusion criteria included concomitant meniscus repair, protocols aimed at pediatric patients, and failure to provide time points for the commencement or recommended completion of any protocol components. A comprehensive, custom scoring rubric was created that was used to assess each protocol for the presence or absence of various rehabilitation components, as well as when those activities were allowed to be initiated in each protocol. Forty-two protocols were included for review from 155 U.S. academic orthopaedic programs. Only 13 protocols (31%) recommended a prehabilitation program. Five protocols (12%) recommended continuous passive motion postoperatively. Eleven protocols (26%) recommended routine partial or non-weight bearing immediately postoperatively. Ten protocols (24%) mentioned utilization of a secondary/functional brace. There was considerable variation in range of desired full-weight-bearing initiation (9 weeks), as well as in the types of strength and proprioception exercises specifically recommended. Only 8 different protocols (19%) recommended return to sport after achieving certain strength and activity criteria. Many ACL rehabilitation protocols recommend treatment modalities not supported by current reports. Moreover, high variability in the composition and time ranges of rehabilitation components may lead to confusion among patients and therapists. Level II. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  11. Optimised low-dose multidetector CT protocol for children with cranial deformity

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, Jose Luis [Complejo Hospitalario Universitario de Vigo, Department of Radiology, Vigo, Pontevedra (Spain); Pombar, Miguel Angel [Complejo Hospitalario Universitario de Santiago, Department of Radiophysics, Santiago de Compostela, La Coruna (Spain); Pumar, Jose Manuel [Complejo Hospitalario Universitario de Santiago, Department of Radiology, Santiago de Compostela, La Coruna (Spain); Campo, Victor Miguel del [Complejo Hospitalario Universitario de Vigo, Department of Public Health, Vigo, Pontevedra (Spain)

    2013-08-15

    To present an optimised low-dose multidetector computed tomography (MDCT) protocol for the study of children with cranial deformity. Ninety-one consecutive MDCT studies were performed in 80 children. Studies were performed with either our standard head CT protocol (group 1, n = 20) or a low-dose cranial deformity protocol (groups 2 and 3). Group 2 (n = 38), initial, and group 3 (n = 33), final and more optimised. All studies were performed in the same 64-MDCT equipment. Cranial deformity protocol was gradationally optimised decreasing kVp, limiting mA range, using automatic exposure control (AEC) and increasing the noise index (NI). Image quality was assessed. Dose indicators such us CT dose index volume (CTDIvol), dose-length product (DLP) and effective dose (E) were used. The optimised low-dose protocol reached the following values: 80 kVp, mA range: 50-150 and NI = 23. We achieved a maximum dose reduction of 10-22 times in the 1- to 12-month-old cranium in regard to the 2004 European guidelines for MDCT. A low-dose MDCT protocol that may be used as the first diagnostic imaging option in clinically selected patients with skull abnormalities. (orig.)

  12. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...

  13. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  14. Computer network time synchronization the network time protocol

    CERN Document Server

    Mills, David L

    2006-01-01

    What started with the sundial has, thus far, been refined to a level of precision based on atomic resonance: Time. Our obsession with time is evident in this continued scaling down to nanosecond resolution and beyond. But this obsession is not without warrant. Precision and time synchronization are critical in many applications, such as air traffic control and stock trading, and pose complex and important challenges in modern information networks.Penned by David L. Mills, the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol

  15. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  16. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  17. Synthetic CT: Simulating low dose single and dual energy protocols from a dual energy scan

    International Nuclear Information System (INIS)

    Wang, Adam S.; Pelc, Norbert J.

    2011-01-01

    Purpose: The choice of CT protocol can greatly impact patient dose and image quality. Since acquiring multiple scans at different techniques on a given patient is undesirable, the ability to predict image quality changes starting from a high quality exam can be quite useful. While existing methods allow one to generate simulated images of lower exposure (mAs) from an acquired CT exam, the authors present and validate a new method called synthetic CT that can generate realistic images of a patient at arbitrary low dose protocols (kVp, mAs, and filtration) for both single and dual energy scans. Methods: The synthetic CT algorithm is derived by carefully ensuring that the expected signal and noise are accurate for the simulated protocol. The method relies on the observation that the material decomposition from a dual energy CT scan allows the transmission of an arbitrary spectrum to be predicted. It requires an initial dual energy scan of the patient to either synthesize raw projections of a single energy scan or synthesize the material decompositions of a dual energy scan. The initial dual energy scan contributes inherent noise to the synthesized projections that must be accounted for before adding more noise to simulate low dose protocols. Therefore, synthetic CT is subject to the constraint that the synthesized data have noise greater than the inherent noise. The authors experimentally validated the synthetic CT algorithm across a range of protocols using a dual energy scan of an acrylic phantom with solutions of different iodine concentrations. An initial 80/140 kVp dual energy scan of the phantom provided the material decomposition necessary to synthesize images at 100 kVp and at 120 kVp, across a range of mAs values. They compared these synthesized single energy scans of the phantom to actual scans at the same protocols. Furthermore, material decompositions of a 100/120 kVp dual energy scan are synthesized by adding correlated noise to the initial material

  18. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  19. The effects of a tailored intensive care unit delirium prevention protocol: A randomized controlled trial.

    Science.gov (United States)

    Moon, Kyoung-Ja; Lee, Sun-Mi

    2015-09-01

    A decreased incidence of delirium following the application of non-pharmacologic intervention protocols to several patient populations has been previously reported. However, few studies have been conducted to examine the effects of their application to intensive care unit (ICU) patients. To examine the effects of applying a tailored delirium preventive protocol, developed by the authors, to ICU patients by analyzing its effects on delirium incidence, in-hospital mortality, ICU readmission, and length of ICU stay in a Korean hospital. A single-blind randomized controlled trial. A 1049-bed general hospital with a 105-bed ICU. Sixty and 63 ICU patients were randomly assigned to the intervention and control groups, respectively. The researchers applied the delirium prevention protocol to the intervention group every day for the first 7 days of ICU hospitalization. Delirium incidence, mortality, and re-admission to the ICU during the same hospitalization period were analyzed by logistic regression analysis; the 7- and 30-day in-hospital mortality by Kaplan-Meier survival and Cox proportional hazard regression analysis; and length of ICU stay was assessed by linear regression analysis. Application of the protocol had no significant effect on delirium incidence, in-hospital mortality, re-admission to the ICU, or length of ICU stay. Whereas the risk of 30-day in-hospital mortality was not significantly lower in the intervention than in the control group (OR: 0.33; 95% CI: 0.10-1.09), we found a significantly decreased 7-day in-hospital mortality in the intervention group after protocol application (HR: 0.09; 95% CI: 0.01-0.72). Application of a tailored delirium prevention protocol to acute stage patients during the first 7 days of ICU hospitalization appeared to reduce the 7-day in-hospital risk of mortality only for this patient population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 September 2001. It was signed in Vienna on 5 December 2001

  1. Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 1997. It was signed in Vienna on 29 September 1997

  2. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    Science.gov (United States)

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P drilling protocol proposed herein may represent a safe approach for implant site preparation.

  3. Large-scale hydrological simulations using the soil water assessment tool, protocol development, and application in the danube basin.

    Science.gov (United States)

    Pagliero, Liliana; Bouraoui, Fayçal; Willems, Patrick; Diels, Jan

    2014-01-01

    The Water Framework Directive of the European Union requires member states to achieve good ecological status of all water bodies. A harmonized pan-European assessment of water resources availability and quality, as affected by various management options, is necessary for a successful implementation of European environmental legislation. In this context, we developed a methodology to predict surface water flow at the pan-European scale using available datasets. Among the hydrological models available, the Soil Water Assessment Tool was selected because its characteristics make it suitable for large-scale applications with limited data requirements. This paper presents the results for the Danube pilot basin. The Danube Basin is one of the largest European watersheds, covering approximately 803,000 km and portions of 14 countries. The modeling data used included land use and management information, a detailed soil parameters map, and high-resolution climate data. The Danube Basin was divided into 4663 subwatersheds of an average size of 179 km. A modeling protocol is proposed to cope with the problems of hydrological regionalization from gauged to ungauged watersheds and overparameterization and identifiability, which are usually present during calibration. The protocol involves a cluster analysis for the determination of hydrological regions and multiobjective calibration using a combination of manual and automated calibration. The proposed protocol was successfully implemented, with the modeled discharges capturing well the overall hydrological behavior of the basin. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  4. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  5. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  6. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  7. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [es

  8. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  9. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [fr

  10. Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non‑Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 16 April 2014 in Basseterre, Saint Kitts and Nevis, and on 19 May 2014 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 May 2014, upon signature by the representatives of Saint Kitts and Nevis and the Agency

  11. Protocol additional to the agreement between the Republic of Mali and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Mali and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 12 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Mali and the Agency, i.e. on 12 September 2002

  12. Use of national metrological references of dose absorbed in water and application of the IAEA TRS nr 398 dosimetry protocol to high energy photon beams. BNM-LNHB-LCIE-SFPM working group

    International Nuclear Information System (INIS)

    Chauvenet, B.; Delaunay, F.; Dolo, J.M.; Le Roy, G.; Bridier, A.; Francois, P.; Sabattier, R.

    2003-01-01

    Metrological references of dose absorbed in water for high energy photon beams used in radiotherapy have been elaborated during the past years by national calibration laboratories, and these new references are the basis of recent dosimetry protocols. However, the passage from metrological references of air kerma to dose absorbed in water, as well as the practical application of new calibration opportunities for dosemeters in high energy X ray beams requires a specific attention to maintain the consistency of dose measurement references over the hospital site. In this respect, this guide aims at the application of these metrological references. It proposes recommendations for the application of metrological references in terms of dose absorbed in water on the hospital site with reference to their determination conditions and to the implementation of the new IAEA dosimetry protocol (TRS nr 398). Thus, this guide proposes an overview of metrological references in French calibration laboratories, presents calibration methods (air kerma in a cobalt 60 gamma photon beam, dose absorbed in water) and a comparison with the IAEA TRS 277 dosimetry protocol. It addresses various practical aspects, and discusses uncertainties

  13. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  14. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  15. Varied Search Protocols Lead to Clinically Relevant Results. A review of: Patel, Manesh R., Connie M. Schardt, Linda L. Sanders, and Sheri A. Keitz. “Randomized Trial for Answers to Clinical Questions: Evaluating a Pre‐Appraised Versus a MEDLINE Search Protocol.” Journal of the Medical Library Association 94.4 (2006: 382‐6.

    Directory of Open Access Journals (Sweden)

    Marcy L. Brown

    2008-03-01

    Full Text Available Objective – To determine the success rate of electronic resources for answering clinical questions by comparing speed, validity, and applicability of two different protocols for searching the medical literature.Design – Randomized trial with results judged by blinded panel.Setting – Duke University Medical Center in Durham, North Carolina, United States ofAmerica.Subjects – Thirty‐two 2nd and 3rd year internal medicine residents on an eight week general medicine rotation at the Duke University Medical Center.Methods – Two search protocols were developed:Protocol A: Participants searched MEDLINE first, and then searched pre‐appraised resources if needed.Protocol B: Participants searched pre‐appraised resources first, which included UpToDate, ACP JournalClub, Cochrane Database of Systematic Reviews, and DARE. The residents then searched MEDLINE if an answer could not be found in the 66 initial group of pre‐appraised resources. Residents were randomised by computer-assisted block order into four blocks of eight residents each. Two blocks were assigned to Protocol A, and two to Protocol B. Each day, residents developed at least one clinical question related to caring for patients. The questions were transcribed onto pocket-sized cards, with the answer sought later using the assigned protocol. If answers weren’t found using either protocol, searches were permitted in other available resources. When an article that answered a question was found, the resident recorded basic information about the question and the answer as well as the time required to find the answer (less than five minutes; between five and ten minutes; or more than ten minutes. Residents were to select answers that were “methodologically sound and clinically important” (384. Ten faculty members formally trained in evidence‐based medicine (EBM reviewed a subset of therapy‐related questions and answers. The reviewers, who were blinded to the search protocols

  16. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  17. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-11

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met.

  18. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 21 April 2011, the date on which the Agency received from the Kingdom of Morocco written notification that Morocco's statutory and constitutional requirements for entry into force had been met

  19. Nonlinear Variation of Parameters Formula for Impulsive Differential Equations with Initial Time Difference and Application

    Directory of Open Access Journals (Sweden)

    Peiguang Wang

    2014-01-01

    Full Text Available This paper establishes variation of parameters formula for impulsive differential equations with initial time difference. As an application, one of the results is used to investigate stability properties of solutions.

  20. Predicting environmental aspects of CCSR leachates through the application of scientifically valid leaching protocols

    International Nuclear Information System (INIS)

    Hassett, D.J.

    1993-01-01

    The disposal of solid wastes from energy production, particularly solid wastes from coal conversion processes, requires a thorough understanding of the waste material as well as the disposal environment. Many coal conversion solid residues (CCSRs) have chemical, mineralogical, and physical properties advantageous for use as engineering construction materials and in other industrial applications. If disposal is to be the final disposition of CCSRs from any source, the very properties that can make ash useful also contribute to behavior that must be understood for scientifically logical and environmentally responsible disposal. This paper describes the application of scientifically valid leaching and characterization tests designed to predict field phenomena. The key to proper characterization of these unique materials is the recognition of and compensation for the hydration reactions that can occur during long-term leaching. Many of these reactions, such as the formation of the mineral ettringite, can have a profound effect on the concentration of potentially problematic trace elements such as boron, chromium, and selenium. The mobility of these elements, which may be concentrated in CCSRs due to the conversion process, must be properly evaluated for the formation of informed and scientifically sound decisions regarding safe disposal. Groundwater is an extremely important and relatively scarce resource. Contamination of this resource is a threat to life, which is highly dependent on it, so management of materials that can impact groundwater must be carefully planned and executed. The application of scientifically valid leaching protocols and complete testing are critical to proper waste management

  1. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  2. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    International Nuclear Information System (INIS)

    Wu, D; France, E; Lambert, J; Hinkle, J

    2016-01-01

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  3. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    Energy Technology Data Exchange (ETDEWEB)

    Wu, D; France, E; Lambert, J; Hinkle, J [The University of Oklahoma Health Sciences Center, Oklahoma City, OK (United States)

    2016-06-15

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  4. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  5. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  6. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  7. Developing community-driven quality improvement initiatives to enhance chronic disease care in Indigenous communities in Canada: the FORGE AHEAD program protocol.

    Science.gov (United States)

    Naqshbandi Hayward, Mariam; Paquette-Warren, Jann; Harris, Stewart B

    2016-07-26

    Given the dramatic rise and impact of chronic diseases and gaps in care in Indigenous peoples in Canada, a shift from the dominant episodic and responsive healthcare model most common in First Nations communities to one that places emphasis on proactive prevention and chronic disease management is urgently needed. The Transformation of Indigenous Primary Healthcare Delivery (FORGE AHEAD) Program partners with 11 First Nations communities across six provinces in Canada to develop and evaluate community-driven quality improvement (QI) initiatives to enhance chronic disease care. FORGE AHEAD is a 5-year research program (2013-2017) that utilizes a pre-post mixed-methods observational design rooted in participatory research principles to work with communities in developing culturally relevant innovations and improved access to available services. This intensive program incorporates a series of 10 inter-related and progressive program activities designed to foster community-driven initiatives with type 2 diabetes mellitus as the action disease. Preparatory activities include a national community profile survey, best practice and policy literature review, and readiness tool development. Community-level intervention activities include community and clinical readiness consultations, development of a diabetes registry and surveillance system, and QI activities. With a focus on capacity building, all community-level activities are driven by trained community members who champion QI initiatives in their community. Program wrap-up activities include readiness tool validation, cost-analysis and process evaluation. In collaboration with Health Canada and the Aboriginal Diabetes Initiative, scale-up toolkits will be developed in order to build on lessons-learned, tools and methods, and to fuel sustainability and spread of successful innovations. The outcomes of this research program, its related cost and the subsequent policy recommendations, will have the potential to

  8. Protocol Additional to the Agreement between Canada and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998 [fr

  9. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    Science.gov (United States)

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.

  10. Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel

    International Nuclear Information System (INIS)

    Huang, Wei; Su, Qi; Li, Yan-Bing; Sun, Ying

    2014-01-01

    In this paper, a quantum key distribution (QKD) protocol, which can be immune to collective amplitude damping noise, is proposed with collective detection strategy. Then a multi-party quantum secret sharing (MQSS) protocol and a quantum private comparison (QPC) protocol are introduced as two applications of the proposed QKD protocol. Except for one participant who is responsible for preparing and measuring quantum states, the rest of the users in each of these protocols only need to perform certain unitary operations due to the utilization of collective detection. Therefore, in addition to the advantage of being secure against collective amplitude damping noise, the proposed protocols still have the advantages of higher qubit efficiency and lower cost for implementation. Moreover, the security of these protocols is guaranteed by theorems on quantum operation discrimination. (papers)

  11. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  12. Simple algorithm for improved security in the FDDI protocol

    Science.gov (United States)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  13. Detecting in situ copepod diet diversity using molecular technique: development of a copepod/symbiotic ciliate-excluding eukaryote-inclusive PCR protocol.

    Science.gov (United States)

    Hu, Simin; Guo, Zhiling; Li, Tao; Carpenter, Edward J; Liu, Sheng; Lin, Senjie

    2014-01-01

    Knowledge of in situ copepod diet diversity is crucial for accurately describing pelagic food web structure but is challenging to achieve due to lack of an easily applicable methodology. To enable analysis with whole copepod-derived DNAs, we developed a copepod-excluding 18S rDNA-based PCR protocol. Although it is effective in depressing amplification of copepod 18S rDNA, its applicability to detect diverse eukaryotes in both mono- and mixed-species has not been demonstrated. Besides, the protocol suffers from the problem that sequences from symbiotic ciliates are overrepresented in the retrieved 18S rDNA libraries. In this study, we designed a blocking primer to make a combined primer set (copepod/symbiotic ciliate-excluding eukaryote-common: CEEC) to depress PCR amplification of symbiotic ciliate sequences while maximizing the range of eukaryotes amplified. We firstly examined the specificity and efficacy of CEEC by PCR-amplifying DNAs from 16 copepod species, 37 representative organisms that are potential prey of copepods and a natural microplankton sample, and then evaluated the efficiency in reconstructing diet composition by detecting the food of both lab-reared and field-collected copepods. Our results showed that the CEEC primer set can successfully amplify 18S rDNA from a wide range of isolated species and mixed-species samples while depressing amplification of that from copepod and targeted symbiotic ciliate, indicating the universality of CEEC in specifically detecting prey of copepods. All the predetermined food offered to copepods in the laboratory were successfully retrieved, suggesting that the CEEC-based protocol can accurately reconstruct the diets of copepods without interference of copepods and their associated ciliates present in the DNA samples. Our initial application to analyzing the food composition of field-collected copepods uncovered diverse prey species, including those currently known, and those that are unsuspected, as copepod prey

  14. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  15. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    Science.gov (United States)

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  16. A Distributed Approach towards Improved Dissemination Protocol for Smooth Handover in MediaSense IoT Platform

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-05-01

    Full Text Available Recently, the Internet has been utilized by many applications to convey time-sensitive messages. The persistently expanding Internet coverage and its easy accessibility have offered to ascend to a problem which was once regarded as not essential to contemplate. Nowadays, the Internet has been utilized by many applications to convey time-sensitive messages. Wireless access points have widely been used but these access points have limitations regarding area coverage. So for covering a wider space, various access points need to be introduced. Therefore, when the user moves to some other place, the devices expected to switch between access points. Packet loss amid the handovers is a trivial issue. MediaSense is an Internet of Things distributed architecture enabling the development of the IoT application faster. It deals with this trivial handover issue by utilizing a protocol called Distributed Context eXchange Protocol. However, this protocol is centralized in nature and also suffers in a scenario when both sender and receiver address change simultaneously. This paper presents a mechanism to deal with this scenario and presents a distributed solution to deal with this issue within the MediaSense platform. The proposed protocol improves dissemination using retransmission mechanism to diminish packet loss. The proposed protocol has been delineated with a proof of concept chat application and the outcomes have indicated a significant improvement in terms of packet loss.

  17. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  18. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  19. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  20. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  1. The Text of a Protocol between the Agency and the Governments of Thailand and the United States of America Terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and Terminating the Protocol Suspending that Agreement

    International Nuclear Information System (INIS)

    1976-01-01

    The text of a protocol between the Agency and the Governments of Thailand and the United States of America terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and terminating the Protocol suspending that Agreement is reproduced in this document for the information of all Members. The Protocol entered into force on 27 June 1974, pursuant to Section 6 thereof.

  2. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  3. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  4. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2001-01-01

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  5. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-05-04

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001.

  6. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  7. Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed on 26 May 2008 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the Republic of Montenegro written notification that Montenegro's statutory and constitutional requirements for entry into force had been met

  8. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-12

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met.

  9. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met [es

  10. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  11. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  12. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met

  13. Protocol Additional to the agreement between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 5 July 2000. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Azerbaijan written notification that Azerbaijan's statutory and/or constitutional requirements for entry into force have been met, i.e. on 29 November 2000

  14. Retrospective analysis of prostate cancer patients with implanted gold markers using off-line and adaptive therapy protocols

    International Nuclear Information System (INIS)

    Litzenberg, Dale W.; Balter, James M.; Lam, Kwok L.; Sandler, Howard M.; Ten Haken, Randall K.

    2005-01-01

    Purpose: To determine the efficacy of applying adaptive and off-line setup correction models to bony anatomy and gold fiducial markers implanted in the prostate, relative to daily alignment to skin tattoos and daily on-line corrections of the implanted gold markers. Methods and Materials: Ten prostate cancer patients with implanted gold fiducial markers were treated using a daily on-line setup correction protocol. The patients' positions were aligned to skin tattoos and two orthogonal diagnostic digital radiographs were obtained before treatment each day. These radiographs were compared with digitally reconstructed radiographs to obtain the translational setup errors of the bony anatomy and gold markers. The adaptive, no-action-level and shrinking-action-level off-line protocols were retrospectively applied to the bony anatomy to determine the change in the setup errors of the gold markers. The protocols were also applied to the gold markers directly to determine the residual setup errors. Results: The percentage of remaining fractions that the gold markers fell within the adaptive margins constructed with 1.5σ' (estimated random variation) after 5, 10, and 15 measurement fractions was 74%, 88%, and 93% for the prone patients and 55%, 77%, and 93% for the supine patients, respectively. Using 2σ', the percentage after 5, 10, and 15 measurements was 85%, 95%, and 97% for the prone patients and 68%, 87%, and 99% for the supine patients, respectively. The average initial three-dimensional (3D) setup error of the gold markers was 0.92 cm for the prone patients and 0.70 cm for the supine patients. Application of the no-action-level protocol to bony anatomy with N m = 3 days resulted in significant benefit to 4 of 10 patients, but 3 were significantly worse. The residual average 3D setup error of the gold markers was 1.14 cm and 0.51 cm for the prone and supine patients, respectively. When applied directly to the gold markers with N m = 3 days, 5 patients benefited and

  15. Protocol Additional to the agreement between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 28 September 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from the Czech Republic written notification that the Czech Republic's statutory and/or constitutional requirements for entry into force have been met, i.e. on 1 July 2002

  16. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  17. Dynamic federations: storage aggregation using open tools and protocols

    CERN Document Server

    Fabrizio Furano, F F; Ricardo Brito da Rocha, R R; Adrien Devresse, A D; Oliver Keeble, O K; Alejandro Alvarez Ayllon, A A

    2012-01-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment- based metadata catalogues, or stateless algorithmic name translations, also known as ”trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique vie...

  18. Applications of the Italian protocol for the calibration of brachytherapy sources

    International Nuclear Information System (INIS)

    Piermattei, A.; Azario, L.

    1997-01-01

    The Associazione Italiana di Fisica Biomedica (AIFB; Italian Association of Biomedical Physics) has adopted the Italian protocol for the calibration of brachytherapy sources. The AIFB protocol allows measurements of the reference air kerma rate, dK/dt r , within 1.7% (1σ). To measure dK/dt r the AIFB protocol has identified a direct and an indirect procedure. The direct procedure is based on the use of spherical or cylindrical ionization chambers as local reference dosimeters positioned along the transverse bisector axis of the source. Once the source is specified by a dK/dt r value, this can be used to calibrate a field instrument, such as a well-type ionization chamber, for further source calibrations by means of an indirect procedure. This paper reports the results obtained by the Physics Laboratory of the Universita Cattolica del S Cuore (PL-UCSC), in terms of dK/dt r calibration of five types of source, 169 Yb, 192 Ir and 137 Cs. The role of the dK/dt r determination for a brachytherapy source has been underlined when a new source such as the 169 Yb seed model X1267 has been proposed for clinical use. The dK/dt r values for 137 Cs spherical sources differed by 5% from the vendor's mean value. The five types of source calibrated in terms of dK/dt r were used to obtain the calibration factor, N K r source , of an HDR-1000 well-type ionization chamber. (author)

  19. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2018-01-01

    In many practical wireless systems, the signal-to-interference-and-noise ratio (SINR) that is applicable to a certain transmission, referred to as channel state information (CSI), can only be learned after the transmission has taken place and is thereby delayed (outdated). In such systems, hybrid...... automatic repeat request (HARQ) protocols are often used to achieve high throughput with low latency. This paper put forth the family of expandable message space (EMS) protocols that generalize the HARQ protocol and allow for rate adaptation based on delayed CSI at the transmitter (CSIT). Assuming a block...

  20. MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

    Directory of Open Access Journals (Sweden)

    Elis Kulla

    2010-01-01

    Full Text Available Recently, a great interest is shown in MANETs potential usage and applications in several fields such as military activities, rescue operations and time-critical applications. In this work, we implement and analyse a MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing in MANET and evaluate the performance of the network through experiments in a real environment. The performance assessment of our testbed is done considering throughput, number of dropped packets and delay. We designed four scenarios: Static, Source Moving, Destination Moving and Source-Destination Moving. From our experimental results, we concluded that when the communicating nodes are moving and the routes change quickly, OLSR (as a proactive protocol performs better than AODV, which is a reactive protocol.

  1. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols.

    Science.gov (United States)

    Bleakley, C M; McDonough, S M; MacAuley, D C; Bjordal, J

    2006-08-01

    The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Sportsmen (n = 44) and members of the general public (n = 45) with mild/moderate acute ankle sprains. Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n = 46) or intermittent ice application (n = 43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0 degrees C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury.

  2. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  3. 15 CFR 785.3 - Initiation of administrative proceedings.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Initiation of administrative proceedings. 785.3 Section 785.3 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS...

  4. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    Science.gov (United States)

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  5. Performance Evaluation of AODV Routing Protocol in VANET with NS2

    Directory of Open Access Journals (Sweden)

    Divya Rathi

    2017-03-01

    Full Text Available In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.

  6. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    Science.gov (United States)

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two

  7. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2018-06-01

    Full Text Available The Internet of Things (IoT utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN, but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN, which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO and the Security-Enhanced Option (SEO. The protocol is validated through Burrows–Abadi–Needham (BAN logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with

  8. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  9. Decentralized session initiation protocol solution in ad hoc networks

    Science.gov (United States)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  10. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 22 March 2013, upon signature by the representatives of the Denmark and the Agency.

  11. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  12. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  13. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  14. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  15. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-10-29

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999.

  16. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  17. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  18. Protocol Additional to the agreement between the Union of the Comoros and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Union of the Comoros and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed in Vienna on 13 December 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 January 2009, the date on which the Agency received from the Union of the Comoros written notification that Comoros' statutory and constitutional requirements for entry into force had been met

  19. NAT Traversing Solutions for SIP Applications

    Directory of Open Access Journals (Sweden)

    Huang Ya-Lin

    2008-01-01

    Full Text Available Abstract Session Initiation Protocol (SIP has been proposed for multimedia services and wide-area connectivity in smart home environments (SHEs. An important issue for SIP deployment in SHEs is network address translator (NAT traversing. SIP and Real-time Transport Protocol (RTP packets are delivered between an SHE (i.e., private IP network and Internet (i.e., a public IP network through an NAT function of a home gateway, and the NAT translates the IP/transport layer address and port number but leaves the application layer content unchanged. This results in inconsistency between the IP addresses/port numbers in the IP/transport layers and those in the SIP layer. To resolve this issue, we describe six solutions including static route, UPnP, STUN, ICE, ALG, and SBC. Then we compare these solutions in terms of smart home appliance (SHA modification, scope of NATs supported, multilayer NAT traversal, ease of configuration, security issue, and time complexities.

  20. NAT Traversing Solutions for SIP Applications

    Directory of Open Access Journals (Sweden)

    Han-Chieh Chao

    2008-05-01

    Full Text Available Session Initiation Protocol (SIP has been proposed for multimedia services and wide-area connectivity in smart home environments (SHEs. An important issue for SIP deployment in SHEs is network address translator (NAT traversing. SIP and Real-time Transport Protocol (RTP packets are delivered between an SHE (i.e., private IP network and Internet (i.e., a public IP network through an NAT function of a home gateway, and the NAT translates the IP/transport layer address and port number but leaves the application layer content unchanged. This results in inconsistency between the IP addresses/port numbers in the IP/transport layers and those in the SIP layer. To resolve this issue, we describe six solutions including static route, UPnP, STUN, ICE, ALG, and SBC. Then we compare these solutions in terms of smart home appliance (SHA modification, scope of NATs supported, multilayer NAT traversal, ease of configuration, security issue, and time complexities.

  1. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  2. Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 22 November 2007. It was signed on 23 June 2010 in Lisbon, Portugal, and on 8 July 2010 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 March 2011, the date on which the Agency received from the Republic of Mozambique written notification that Mozambique's statutory and constitutional requirements for entry into force had been met

  3. Evaluation of Adherence to a Convulsion management Protocol for Children in Rwanda

    OpenAIRE

    kaputu-kalal-malu, Célestin; D'Amour Birindabagabo, Jean; Walker, Timothy David; Mafuta-Musalu, Eric; Ntumba-Tshitenge, Olga; Preux, Pierre-Marie; MISSON, Jean-Paul

    2014-01-01

    Inappropriate seizure management may result in high morbidity and mortality. We assessed the adherence of health professionals in southern Rwanda to a national protocol for pharmacological management of seizures in children. A questionnaire featuring a 5-year-old child with generalized prolonged seizures was administered. The questions focused on the choice of initial treatment and the sequence of management following failure of the initial treatment choice. Benzodiazepine was cho...

  4. Feasibility and effectiveness of the baby friendly community initiative in rural Kenya: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Kimani-Murage, Elizabeth W; Kimiywe, Judith; Kabue, Mark; Wekesah, Frederick; Matiri, Evelyn; Muhia, Nelson; Wanjohi, Milka; Muriuki, Peterrock; Samburu, Betty; Kanyuira, James N; Young, Sera L; Griffiths, Paula L; Madise, Nyovani J; McGarvey, Stephen T

    2015-09-28

    Interventions promoting optimal infant and young child nutrition could prevent a fifth of under-5 deaths in countries with high mortality. Poor infant and young child feeding practices are widely documented in Kenya, with potential detrimental effects on child growth, health and survival. Effective strategies to improve these practices are needed. This study aims to pilot implementation of the Baby Friendly Community Initiative (BFCI), a global initiative aimed at promoting optimal infant and young child feeding practices, to determine its feasibility and effectiveness with regards to infant feeding practices, nutrition and health outcomes in a rural setting in Kenya. The study, employing a cluster-randomized trial design, will be conducted in rural Kenya. A total of 12 clusters, constituting community units within the government's Community Health Strategy, will be randomized, with half allocated to the intervention and the other half to the control arm. A total of 812 pregnant women and their respective children will be recruited into the study. The mother-child pairs will be followed up until the child is 6 months old. Recruitment will last approximately 1 year from January 2015, and the study will run for 3 years, from 2014 to 2016. The intervention will involve regular counseling and support of mothers by trained community health workers and health professionals on maternal, infant and young child nutrition. Regular assessment of knowledge, attitudes and practices on maternal, infant and young child nutrition will be done, coupled with assessment of nutritional status of the mother-child pairs and morbidity for the children. Statistical methods will include analysis of covariance, multinomial logistic regression and multilevel modeling. The study is funded by the NIH and USAID through the Program for Enhanced Research (PEER) Health. Findings from the study outlined in this protocol will inform potential feasibility and effectiveness of a community

  5. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  6. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  7. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID−TIA): study protocol for a pilot randomised controlled trial

    Science.gov (United States)

    2013-01-01

    Background People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist – that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? Methods/Design This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final

  8. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID-TIA): study protocol for a pilot randomised controlled trial.

    Science.gov (United States)

    Edwards, Duncan; Fletcher, Kate; Deller, Rachel; McManus, Richard; Lasserson, Daniel; Giles, Matthew; Sims, Don; Norrie, John; McGuire, Graham; Cohn, Simon; Whittle, Fiona; Hobbs, Vikki; Weir, Christopher; Mant, Jonathan

    2013-07-02

    People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist--that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final TIA clinic diagnosis as the

  9. Evaluation of Two Estrus Synchronization Protocols in Dairy Cattle at North Shoa Zone Ethiopia

    OpenAIRE

    Chanyalew, Yeshimebet; Zewde, Tesfaye; Gatew, Hulunim; Girma, Lina; Kassa, Getachew; Demis, Chekol; Bihon, Amare; Tsegaye, Yeshak

    2017-01-01

    This study was initiated to change the hesitation of the farmer on the effectiveness of estrus synchronization under their (Ethiopian small holder) livestock management system using two synchronization protocols. Non-pregnant animals with normal reproductive tract and that fulfilled the preconditions for estrus synchronization were considered for treatment & assigned into two synchronization protocols (single PGF2α injection; and double PGF2α injection). Among 94 (27 heifer and 67 cows) synch...

  10. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [fr

  11. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [es

  12. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  13. Comparison of in-and outpatients protocols for providence night time only bracing in AIS patients -- compliance and satisfaction

    DEFF Research Database (Denmark)

    Al-Aubaidi, Zaid Tj; Tropp, Hans; Pedersen, Niels W

    2013-01-01

    BACKGROUND: Skeletally immature patients diagnosed with adolescent idiopathic scoliosis (AIS) and a Cobb angle above 25degrees is usually treated with a brace. Standard protocols in many centers include hospitalisation for a few days for the purpose of brace adaptation and fitting. The aim...... of this study is to compare compliance and satisfaction in hospitalization and out patient clinic protocols, at the initiation phase of brace treatment.Materials and methodsTwenty-four consecutive patients with AIS were initiated with the Providence night time only brace at our department between October 2008...

  14. Scoping review protocol: education initiatives for medical psychiatry collaborative care.

    Science.gov (United States)

    Shen, Nelson; Sockalingam, Sanjeev; Abi Jaoude, Alexxa; Bailey, Sharon M; Bernier, Thérèse; Freeland, Alison; Hawa, Aceel; Hollenberg, Elisa; Woldemichael, Bethel; Wiljer, David

    2017-09-03

    The collaborative care model is an approach providing care to those with mental health and addictions disorders in the primary care setting. There is a robust evidence base demonstrating its clinical and cost-effectiveness in comparison with usual care; however, the transitioning to this new paradigm of care has been difficult. While there are efforts to train and prepare healthcare professionals, not much is known about the current state of collaborative care training programmes. The objective of this scoping review is to understand how widespread these collaborative care education initiatives are, how they are implemented and their impacts. The scoping review methodology uses the established review methodology by Arksey and O'Malley. The search strategy was developed by a medical librarian and will be applied in eight different databases spanning multiple disciplines. A two-stage screening process consisting of a title and abstract scan and a full-text review will be used to determine the eligibility of articles. To be included, articles must report on an existing collaborative care education initiative for healthcare providers. All articles will be independently assessed for eligibility by pairs of reviewers, and all eligible articles will be abstracted and charted in duplicate using a standardised form. The extracted data will undergo a 'narrative review' or a descriptive analysis of the contextual or process-oriented data and simple quantitative analysis using descriptive statistics. Research ethics approval is not required for this scoping review. The results of this scoping review will inform the development of a collaborative care training initiative emerging from the Medical Psychiatry Alliance, a four-institution philanthropic partnership in Ontario, Canada. The results will also be presented at relevant national and international conferences and published in a peer-reviewed journal. © Article author(s) (or their employer(s) unless otherwise stated in

  15. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  16. Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.

    Science.gov (United States)

    Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng

    2017-11-01

    The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.

  17. Development of a product screening protocol to minimize marine environmental impacts of oil production chemicals used offshore

    International Nuclear Information System (INIS)

    Vik, E.A.; Berg, J.D.; Bakke, S.; Oefjord, G.D.; Reinhard, M.

    1992-01-01

    This paper presents the initial results of a research project initiated by Conoco Norway, Inc. (CNI) late in 1989. The objective of the project is to develop a screening protocol for determining the potential environmental impacts of five types of chemicals typically used in offshore oil and gas production operations in the North Sea. The protocol includes tests for determination of bioaccumulation potential, oil-water distribution factor, biodegradation potential, and toxicity. When fully developed, the protocol represents one possible approach to implementing the proposed PARCOM standard testing program. Only the results for the bioaccumulation potential and oil-water distribution factor are presented here. For determination of bioaccumulation potential, the High Performance Liquid Chromotography (HPLC) is recommended. The oil-water distribution factor can be determined by surrogate parameters as total organic carbon (TOC), UV-absorption or gas chromatography (GC). (Author)

  18. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  19. Evaluation of a protocol for the non-operative management of perforated peptic ulcer.

    Science.gov (United States)

    Marshall, C; Ramaswamy, P; Bergin, F G; Rosenberg, I L; Leaper, D J

    1999-01-01

    The non-operative management of perforated peptic ulcer has previously been shown to be both safe and effective although it remains controversial. A protocol for non-operative management was set up in this hospital in 1989. Adherence to the guidelines in the protocol has been audited over a 6-year period with a review of outcome. The case-notes of patients with a diagnosis of perforated peptic ulcer were reviewed. Twelve guidelines from the protocol were selected for evaluation of compliance to the protocol. Forty-nine patients underwent non-operative treatment initially. Eight patients failed to respond and underwent operation. Complications included abscess formation (seven patients), renal failure (one), gastric ileus (one), chest infection (two), and cardiac failure and stroke (one). Four deaths occurred in this group. Adherence to certain protocol guidelines was poor, notably those concerning prevention of thromboembolism, use of antibiotics, use of contrast examination to confirm the diagnosis and referral for follow-up endoscopy. Two gastric cancers were detected on subsequent endoscopy. This experience demonstrates that non-operative treatment can be used successfully in a general hospital. Adherence to protocol guidelines was found to be variable and the protocol has therefore been simplified. This study highlights the need for an accurate diagnosis and the importance of follow-up endoscopy.

  20. Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil

    Science.gov (United States)

    Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W

    2016-01-01

    Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.

  1. Comparison of Diffusion MRI Acquisition Protocols for the In Vivo Characterization of the Mouse Spinal Cord: Variability Analysis and Application to an Amyotrophic Lateral Sclerosis Model.

    Science.gov (United States)

    Figini, Matteo; Scotti, Alessandro; Marcuzzo, Stefania; Bonanno, Silvia; Padelli, Francesco; Moreno-Manzano, Victoria; García-Verdugo, José Manuel; Bernasconi, Pia; Mantegazza, Renato; Bruzzone, Maria Grazia; Zucca, Ileana

    2016-01-01

    Diffusion-weighted Magnetic Resonance Imaging (dMRI) has relevant applications in the microstructural characterization of the spinal cord, especially in neurodegenerative diseases. Animal models have a pivotal role in the study of such diseases; however, in vivo spinal dMRI of small animals entails additional challenges that require a systematical investigation of acquisition parameters. The purpose of this study is to compare three acquisition protocols and identify the scanning parameters allowing a robust estimation of the main diffusion quantities and a good sensitivity to neurodegeneration in the mouse spinal cord. For all the protocols, the signal-to-noise and contrast-to noise ratios and the mean value and variability of Diffusion Tensor metrics were evaluated in healthy controls. For the estimation of fractional anisotropy less variability was provided by protocols with more diffusion directions, for the estimation of mean, axial and radial diffusivity by protocols with fewer diffusion directions and higher diffusion weighting. Intermediate features (12 directions, b = 1200 s/mm2) provided the overall minimum inter- and intra-subject variability in most cases. In order to test the diagnostic sensitivity of the protocols, 7 G93A-SOD1 mice (model of amyotrophic lateral sclerosis) at 10 and 17 weeks of age were scanned and the derived diffusion parameters compared with those estimated in age-matched healthy animals. The protocols with an intermediate or high number of diffusion directions provided the best differentiation between the two groups at week 17, whereas only few local significant differences were highlighted at week 10. According to our results, a dMRI protocol with an intermediate number of diffusion gradient directions and a relatively high diffusion weighting is optimal for spinal cord imaging. Further work is needed to confirm these results and for a finer tuning of acquisition parameters. Nevertheless, our findings could be important for the

  2. The Enzyme Function Initiative.

    Science.gov (United States)

    Gerlt, John A; Allen, Karen N; Almo, Steven C; Armstrong, Richard N; Babbitt, Patricia C; Cronan, John E; Dunaway-Mariano, Debra; Imker, Heidi J; Jacobson, Matthew P; Minor, Wladek; Poulter, C Dale; Raushel, Frank M; Sali, Andrej; Shoichet, Brian K; Sweedler, Jonathan V

    2011-11-22

    The Enzyme Function Initiative (EFI) was recently established to address the challenge of assigning reliable functions to enzymes discovered in bacterial genome projects; in this Current Topic, we review the structure and operations of the EFI. The EFI includes the Superfamily/Genome, Protein, Structure, Computation, and Data/Dissemination Cores that provide the infrastructure for reliably predicting the in vitro functions of unknown enzymes. The initial targets for functional assignment are selected from five functionally diverse superfamilies (amidohydrolase, enolase, glutathione transferase, haloalkanoic acid dehalogenase, and isoprenoid synthase), with five superfamily specific Bridging Projects experimentally testing the predicted in vitro enzymatic activities. The EFI also includes the Microbiology Core that evaluates the in vivo context of in vitro enzymatic functions and confirms the functional predictions of the EFI. The deliverables of the EFI to the scientific community include (1) development of a large-scale, multidisciplinary sequence/structure-based strategy for functional assignment of unknown enzymes discovered in genome projects (target selection, protein production, structure determination, computation, experimental enzymology, microbiology, and structure-based annotation), (2) dissemination of the strategy to the community via publications, collaborations, workshops, and symposia, (3) computational and bioinformatic tools for using the strategy, (4) provision of experimental protocols and/or reagents for enzyme production and characterization, and (5) dissemination of data via the EFI's Website, http://enzymefunction.org. The realization of multidisciplinary strategies for functional assignment will begin to define the full metabolic diversity that exists in nature and will impact basic biochemical and evolutionary understanding, as well as a wide range of applications of central importance to industrial, medicinal, and pharmaceutical efforts.

  3. New mechanism of spiral wave initiation in a reaction-diffusion-mechanics system.

    Science.gov (United States)

    Weise, Louis D; Panfilov, Alexander V

    2011-01-01

    Spiral wave initiation in the heart muscle is a mechanism for the onset of dangerous cardiac arrhythmias. A standard protocol for spiral wave initiation is the application of a stimulus in the refractory tail of a propagating excitation wave, a region that we call the "classical vulnerable zone." Previous studies of vulnerability to spiral wave initiation did not take the influence of deformation into account, which has been shown to have a substantial effect on the excitation process of cardiomyocytes via the mechano-electrical feedback phenomenon. In this work we study the effect of deformation on the vulnerability of excitable media in a discrete reaction-diffusion-mechanics (dRDM) model. The dRDM model combines FitzHugh-Nagumo type equations for cardiac excitation with a discrete mechanical description of a finite-elastic isotropic material (Seth material) to model cardiac excitation-contraction coupling and stretch activated depolarizing current. We show that deformation alters the "classical," and forms a new vulnerable zone at longer coupling intervals. This mechanically caused vulnerable zone results in a new mechanism of spiral wave initiation, where unidirectional conduction block and rotation directions of the consequently initiated spiral waves are opposite compared to the mechanism of spiral wave initiation due to the "classical vulnerable zone." We show that this new mechanism of spiral wave initiation can naturally occur in situations that involve wave fronts with curvature, and discuss its relation to supernormal excitability of cardiac tissue. The concept of mechanically induced vulnerability may lead to a better understanding about the onset of dangerous heart arrhythmias via mechano-electrical feedback.

  4. Report: demonstrable progresses of the France according the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-06-01

    This document constitutes the report of the France on the demonstrable progresses according the application of the 3 article of the Kyoto protocol. The first chapter is a description of the french climatic policy, as the second presents the tendencies and the projections concerning the greenhouse effect gases emissions. The chapter 3 details the policies effects and the measures ( energy, transport, industry and wastes). The last chapter is devoted to the respect of the other engagements articles 10 and 11 of the Kyoto protocol. (A.L.B.)

  5. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  6. Evaluating Data Abstraction Assistant, a novel software application for data abstraction during systematic reviews: protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ian J. Saldanha

    2016-11-01

    Full Text Available Abstract Background Data abstraction, a critical systematic review step, is time-consuming and prone to errors. Current standards for approaches to data abstraction rest on a weak evidence base. We developed the Data Abstraction Assistant (DAA, a novel software application designed to facilitate the abstraction process by allowing users to (1 view study article PDFs juxtaposed to electronic data abstraction forms linked to a data abstraction system, (2 highlight (or “pin” the location of the text in the PDF, and (3 copy relevant text from the PDF into the form. We describe the design of a randomized controlled trial (RCT that compares the relative effectiveness of (A DAA-facilitated single abstraction plus verification by a second person, (B traditional (non-DAA-facilitated single abstraction plus verification by a second person, and (C traditional independent dual abstraction plus adjudication to ascertain the accuracy and efficiency of abstraction. Methods This is an online, randomized, three-arm, crossover trial. We will enroll 24 pairs of abstractors (i.e., sample size is 48 participants, each pair comprising one less and one more experienced abstractor. Pairs will be randomized to abstract data from six articles, two under each of the three approaches. Abstractors will complete pre-tested data abstraction forms using the Systematic Review Data Repository (SRDR, an online data abstraction system. The primary outcomes are (1 proportion of data items abstracted that constitute an error (compared with an answer key and (2 total time taken to complete abstraction (by two abstractors in the pair, including verification and/or adjudication. Discussion The DAA trial uses a practical design to test a novel software application as a tool to help improve the accuracy and efficiency of the data abstraction process during systematic reviews. Findings from the DAA trial will provide much-needed evidence to strengthen current recommendations for data

  7. Protocol for the development of the Master Chemical Mechanism, MCM v3 (Part A: tropospheric degradation of non-aromatic volatile organic compounds

    Directory of Open Access Journals (Sweden)

    S. M. Saunders

    2003-01-01

    Full Text Available Kinetic and mechanistic data relevant to the tropospheric degradation of volatile organic compounds (VOC, and the production of secondary pollutants, have previously been used to define a protocol which underpinned the construction of a near-explicit Master Chemical Mechanism. In this paper, an update to the previous protocol is presented, which has been used to define degradation schemes for 107 non-aromatic VOC as part of version 3 of the Master Chemical Mechanism (MCM v3. The treatment of 18 aromatic VOC is described in a companion paper. The protocol is divided into a series of subsections describing initiation reactions, the reactions of the radical intermediates and the further degradation of first and subsequent generation products. Emphasis is placed on updating the previous information, and outlining the methodology which is specifically applicable to VOC not considered previously (e.g. a- and b-pinene. The present protocol aims to take into consideration work available in the open literature up to the beginning of 2001, and some other studies known by the authors which were under review at the time. Application of MCM v3 in appropriate box models indicates that the representation of isoprene degradation provides a good description of the speciated distribution of oxygenated organic products observed in reported field studies where isoprene was the dominant emitted hydrocarbon, and that the a-pinene degradation chemistry provides a good description of the time dependence of key gas phase species in a-pinene/NOX photo-oxidation experiments carried out in the European Photoreactor (EUPHORE. Photochemical Ozone Creation Potentials (POCP have been calculated for the 106 non-aromatic non-methane VOC in MCM v3 for idealised conditions appropriate to north-west Europe, using a photochemical trajectory model. The POCP values provide a measure of the relative ozone forming abilities of the VOC. Where applicable, the values are compared with

  8. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-03-28

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001.

  9. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  10. Discrepancies in sample size calculations and data analyses reported in randomised trials: comparison of publications with protocols

    DEFF Research Database (Denmark)

    Chan, A.W.; Hrobjartsson, A.; Jorgensen, K.J.

    2008-01-01

    OBJECTIVE: To evaluate how often sample size calculations and methods of statistical analysis are pre-specified or changed in randomised trials. DESIGN: Retrospective cohort study. Data source Protocols and journal publications of published randomised parallel group trials initially approved...... in 1994-5 by the scientific-ethics committees for Copenhagen and Frederiksberg, Denmark (n=70). MAIN OUTCOME MEASURE: Proportion of protocols and publications that did not provide key information about sample size calculations and statistical methods; proportion of trials with discrepancies between...... of handling missing data was described in 16 protocols and 49 publications. 39/49 protocols and 42/43 publications reported the statistical test used to analyse primary outcome measures. Unacknowledged discrepancies between protocols and publications were found for sample size calculations (18/34 trials...

  11. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  12. A bridge between two conventions on civil liability for nuclear damage: The Joint Protocol relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    Busekist, Otto von

    2006-01-01

    The adoption of the Joint Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and the NEA, was hailed as landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. The present article attempts to describe the history of the Joint Protocol during the many years it took to develop this link between the two conventions, to provide comment on its objectives and content, and to discuss some important questions related to its application

  13. A bridge between two Conventions on civil liability for nuclear damage: the Joint protocol Relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    Busekist, O. von.

    1989-01-01

    The adoption of the Joint-Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and NEA, was hailed as a landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. This article describes the history of the Joint Protocol during the many years it took to develop this link between the two Conventions, provides a comment on its objectives and content, and discusses some important questions related to its application. (NEA) [fr

  14. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  15. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  16. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna [es

  17. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010 [es

  18. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-09-14

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000.

  19. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  20. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  1. Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed in Vienna on 22 September 2005

  2. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-09-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  3. Non-invasive Assessments of Subjective and Objective Recovery Characteristics Following an Exhaustive Jump Protocol

    Science.gov (United States)

    Hohenauer, Erich; Clarys, Peter; Baeyens, Jean-Pierre; Clijsen, Ron

    2017-01-01

    Fast recovery after strenuous exercise is important in sports and is often studied via cryotherapy applications. Cryotherapy has a significant vasoconstrictive effect, which seems to be the leading factor in its effectiveness. The resulting enhanced recovery can be measured by using both objective and subjective parameters. Two commonly measured subjective characteristics of recovery are delayed-onset muscle soreness (DOMS) and ratings of perceived exertion (RPE). Two important objective recovery characteristics are countermovement jump (CMJ) performance and peak power output (PPO). Here, we provide a detailed protocol to induce muscular exhaustion of the frontal thighs with a self-paced, 3 x 30 countermovement jump protocol (30-s rest between each set). This randomized controlled trial protocol explains how to perform local cryotherapy cuff application (+ 8 °C for 20 min) and thermoneutral cuff application (+ 32 °C for 20 min) on both thighs as two possible post-exercise recovery modalities. Finally, we provide a non-invasive protocol to measure the effects of these two recovery modalities on subjective (i.e., DOMS of both frontal thighs and RPE) and objective recovery (i.e., CMJ and PPO) characteristics 24, 48, and 72 h post-application. The advantage of this method is that it provides a tool for researchers or coaches to induce muscular exhaustion, without using any expensive devices; to implement local cooling strategies; and to measure both subjective and objective recovery, without using invasive methods. Limitations of this protocol are that the 30 s rest period between sets is very short, and the cardiovascular demand is very high. Future studies may find the assessment of maximum voluntary contractions to be a more sensitive assessment of muscular exhaustion compared to CMJs. PMID:28654037

  4. Protocol optimization for in vitro mass propagation of two sugarcane ...

    African Journals Online (AJOL)

    SAM

    2014-03-19

    Mar 19, 2014 ... The present study was initiated to optimize in vitro protocol for mass propagation of two commercial sugarcane clones (Co 449 and Co .... mass propagation of sugarcane genotypes grown in. Ethiopia, and due to this the .... transferred cultures showed multiple shooting with an average of 9.10 ± 0.10 shoots ...

  5. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [fr

  6. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met. [es

  7. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [es

  8. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  9. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  10. Protocol Additional to the agreement between the Republic of Colombia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Colombia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 25 November 2004. It was signed in Vienna on 11 May 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 5 March 2009, the date on which the Agency received from Colombia written notification that Colombia's statutory and constitutional requirements for entry into force had been met

  11. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  12. Fluid resuscitation for major burn patients with the TMMU protocol.

    Science.gov (United States)

    Luo, Gaoxing; Peng, Yizhi; Yuan, Zhiqiang; Cheng, Wenguang; Wu, Jun; Tang, Jin; Huang, Yuesheng; Fitzgerald, Mark

    2009-12-01

    Fluid resuscitation is one of the critical treatments for the major burn patient in the early phases after injury. We evaluated the practice of fluid resuscitation for severely burned patients with the Third Military Medical University (TMMU) protocol, which is most widely used in many regions of China. Patients with major burns (>30% total body surface area (TBSA)) presenting to Southwest Hospital, Third Military Medical University, between January 2005 and October 2007, were included in this study. Fluid resuscitation was initiated by the TMMU protocol. A total of 71 patients were (46 adults and 25 children) included in this study. All patients survived the first 48 h after injury smoothly and none developed abdominal compartment syndrome or other recognised complications associated with fluid resuscitation. The average quantity of fluid infused was 3.3-61.33% more than that calculated based on the TMMU protocol in both adult and paediatric groups. The average urine output during the first 24h after injury was about 1.2 ml per kg body weight per hour in the two groups, but reached 1.2 ml and 1.7 ml during the second 24h in adult and pediatric groups, respectively. This study indicates that the TMMU protocol for fluid resuscitation is a feasible option for burn patients. Individualised resuscitation - guided by the physiological response to fluid administration - is still important as in other protocols.

  13. Evaluation of the Effectiveness of Two Morphine Protocols to Treat Neonatal Abstinence Syndrome in a Level II Nursery in a Community Hospital.

    Science.gov (United States)

    DeAtley, Heather N; Burton, Amanda; Fraley, Michelle DeLuca; Haltom, Joan

    2017-07-01

    The authors sought to evaluate the impact on length of hospital stay and treatment duration of morphine after implementation of a change in the institutional protocol for managing neonatal abstinence syndrome (NAS) in an effort to improve patient outcomes. A single-center, retrospective chart review was conducted at a Level II nursery in a community hospital in Kentucky. Fifty-nine neonates born between January 1, 2014, and December 31, 2015, who were diagnosed with NAS and received morphine for treatment were included. The protocol 1 group consisted of 33 neonates who received an initial dose of morphine 0.04 mg/kg/dose administered orally every 4 hours (January 1-December 31, 2014), and the protocol 2 group consisted of 26 neonates who received an initial dose of morphine 0.06 mg/kg/dose administered orally every 3 hours (January 1-November 30, 2015), after a change in the protocol for managing NAS was implemented on January 1, 2015. Data were reviewed and compared between the two protocol groups to determine the impact that the dosage change had on length of hospital stay and morphine treatment duration. The average length of stay decreased by 7 days in the protocol 2 group compared with the protocol 1 group (21 vs 28.65 days). The average duration of treatment decreased by 7 days in the protocol 2 group compared with the protocol 1 group (18.3 vs 25.4 days). These differences between groups were not statistically significant, however, because the population size was not large enough to achieve adequate power. These results indicate that protocol 2 displayed the potential to decrease length of stay and duration of treatment compared with protocol 1 at this facility; however, balancing higher starting doses with the risk of oversedation will continue to challenge the health care team. Concern for oversedation when using the higher starting dose in protocol 2 has prompted further research (e.g., protocol 3, initial morphine 0.05 mg/kg/dose every 3 hrs). Continued

  14. Use of limited MR protocol (coronal STIR) in the evaluation of patients with hip pain

    International Nuclear Information System (INIS)

    Khoury, N.J.; Birjawi, G.A.; Hourani, M.H.; Chaaya, M.

    2003-01-01

    To assess the role of a limited MR protocol (coronal STIR) as the initial part of the MR examination in patients with hip pain. Eighty-five patients presenting with hip pain, and normal radiographs of the pelvis, and who underwent our full MR protocol for hips were included retrospectively in the study. The full protocol consists of coronal T1-weighted and short tau inversion-recovery (STIR), and axial T2-weighted sequences. Ninety-three MR examinations were performed. Two radiologists interpreted the STIR (limited) examinations and the full studies separately, masked to each other's findings and to the final diagnosis. Comparison between the two protocols was then undertaken. For both readers, all normal MR examinations on the coronal STIR limited protocol were normal on the full protocol, with an interobserver reliability of 0.96. The STIR protocol was able to detect the presence or absence of an abnormality in 100% of cases (sensitivity). The STIR-only protocol provided a specific diagnosis in only 65% of cases (specificity). A normal coronal STIR study of the hips in patients with hip pain and normal radiographs precludes the need for further pelvic MR sequences. Any abnormality detected on this limited protocol should be further assessed by additional MR sequences. (orig.)

  15. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  16. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  17. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  18. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-07

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met.

  19. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-08-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  20. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.