WorldWideScience

Sample records for application protocol initial

  1. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  2. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  3. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  4. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  5. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  6. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  7. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  8. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  9. Closed Conference Signalling Using the Session Initiation Protocol.

    Science.gov (United States)

    Miladinovic, Igor; Stadler, Johannes

    2003-01-01

    Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…

  10. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  11. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  12. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  13. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  14. A protocol for the retina surgeon's safe initial intravitreal injections.

    Science.gov (United States)

    Frenkel, Ronald E P; Haji, Shamim A; La, Melvin; Frenkel, Max P C; Reyes, Angela

    2010-11-10

    To determine the safety of a surgeon's initial consecutive intravitreal injections using a specific protocol and to review the complications that may be attributed to the injection procedure. A retrospective chart review. Fifty-nine patients (30 females, 29 males) received intravitreal injections of pegaptanib, bevacizumab, or ranibizumab as part of their treatment for neovascular age-related macular degeneration. The average patient age was 80 years. Twenty-two patients were diagnosed with or suspected of having glaucoma. Each patient received an average of 5.8 injections. The charts of 59 patients who received a total of 345 intravitreal injections (104 pegaptanib, 74 bevacizumab, 167 ranibizumab) were reviewed. All injections were performed in an office-based setting. Povidone-iodine, topical antibiotics, and eye speculum were used as part of the pre injection procedure. Vision and intraocular pressure were evaluated immediately following each injection. Incidence of post injection complications, including but not limited to endophthalmitis, retinal detachment, traumatic cataract, and vitreous hemorrhage. There were no cases of endophthalmitis, toxic reactions, traumatic cataracts, retinal detachment, or vitreous hemorrhage. There was one case each of lid swelling, transient floaters, retinal pigment epithelial tear, corneal edema, and corneal abrasion. There were five cases of transient no light perception following pegaptanib injections. The incidence of serious complications was very low for the intravitreal injections given. A surgeon's initial intravitreal injections may be performed with a very high degree of safety using this protocol.

  15. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  16. Application of QC_DR software for acceptance testing and routine quality control of direct digital radiography systems: initial experiences using the Italian Association of Physicist in Medicine quality control protocol.

    Science.gov (United States)

    Nitrosi, Andrea; Bertolini, Marco; Borasi, Giovanni; Botti, Andrea; Barani, Adriana; Rivetti, Stefano; Pierotti, Luisa

    2009-12-01

    Ideally, medical x-ray imaging systems should be designed to deliver maximum image quality at an acceptable radiation risk to the patient. Quality assurance procedures are employed to ensure that these standards are maintained. A quality control protocol for direct digital radiography (DDR) systems is described and discussed. Software to automatically process and analyze the required images was developed. In this paper, the initial results obtained on equipment of different DDR manufacturers were reported. The protocol was developed to highlight even small discrepancies in standard operating performance.

  17. Peer-to-peer session initiation protocol in highly volatile environments

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Roper, I.; Morphett, J.

    2008-01-01

    The session initiation protocol (SIP) is an IETF standardised protocol for multimedia signalling and communication over the internet. SIP has been used in many deployments in client-server architecture. However, this configuration potentially possesses various scalability and redundancy limitations

  18. Biological quarantine on international waters: an initiative for onboard protocols

    Science.gov (United States)

    Takano, Yoshinori; Yano, Hajime; Funase, Ryu; Sekine, Yasuhito; Takai, Ken

    2012-07-01

    The research vessel Chikyu is expanding new frontiers in science, technology, and international collaboration through deep-sea expedition. The Chikyu (length: 210 m, gross tonnage: 56752 tons) has advanced and comprehensive scientific research facilities. One of the scientific purposes of the vessel is to investigate into unexplored biosphere (i.e., undescribed extremophiles) on the Earth. Therefore, "the onboard laboratory" provides us systematic microbiological protocols with a physical containment situation. In parallel, the onboard equipments provide sufficient space for fifty scientists and technical support staff. The helicopter deck also supports various logistics through transporting by a large scale helicopter (See, http://www.jamstec.go.jp/chikyu/eng/). Since the establishment of Panel on Planetary Protection (PPP) in Committee on Space Research (COSPAR), we have an international consensus about the development and promulgation of planetary protection knowledge, policy, and plans to prevent the harmful effects of biological contamination on the Earth (e.g., Rummel, 2002). However, the matter to select a candidate location of initial quarantine at BSL4 level is often problematic. To answer the key issue, we suggest that international waters can be a meaningful option with several advantages to conduct initial onboard-biological quarantine investigation. Hence, the research vessel Chikyu is promising for further PPP requirements (e.g., Enceladus sample return project: Tsou et al., 2012). Rummel, J., Seeking an international consensus in planetary protection: COSPAR's planetary protection panel. Advances in Space Research, 30, 1573-1575 (2002). Tsou, P. et al. LIFE: Life Investigation For Enceladus - A Sample Return Mission Concept in Search for Evidence of Life. Astrobiology, in press.

  19. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  20. Comparison of different initiation protocols in the resistant hepatocyte model

    International Nuclear Information System (INIS)

    Espandiari, Parvaneh; Robertson, Larry W.; Srinivasan, Cidambi; Glauert, Howard P.

    2005-01-01

    Several models in rat liver have been developed to study multistage carcinogenesis, including the Solt-Farber resistant hepatocyte model. In this model, initiation consists of either a necrogenic dose of a hepatocarcinogen or a non-necrogenic dose in conjunction with partial hepatectomy (PH). As an alternative to PH, we investigated two different procedures: fasting for 96 h followed by refeeding, or the use of one-day-old neonates. Male Fisher 344 rats were injected p.o. with diethylnitrosamine (DEN) (0, 20, or 100 mg/kg) 24 h after refeeding or PH (controls received DEN alone with no proliferative stimulus). For the neonatal group, male and female Fisher 344 rats were treated with DEN (0 or 20 mg/kg, i.p.) at one day of age. All initiated animals were treated at the same age (11 weeks) with the following selection agents: three daily doses of 2-acetylaminofluorene (AAF) (30 mg/kg), followed by a single dose of carbon tetrachloride (2 ml/kg), followed by three additional daily treatments of AAF (30 mg/kg). Rats were euthanized 2 weeks after the last AAF injection. The PH, neonatal male, and neonatal female groups receiving DEN developed more γ-glutamyl transpeptidase (GGT)-positive foci per cubic centimeter and foci per liver as compared to untreated rats receiving the same proliferative stimulus, whereas the fasting/refeeding group and the group receiving no proliferative stimulus did not. All DEN-treated groups receiving one of the proliferative stimuli had more foci per cubic centimeter than the DEN-treated group receiving no proliferative stimulus. The volume fractions of GGT-positive foci in the PH/DEN and neonatal male/DEN groups were higher than those of both the DEN-treated group receiving no proliferative stimulus and the groups receiving the same proliferative stimulus without DEN. In neonatal females-receiving DEN, the volume fraction was not different from either neonatal females not receiving DEN or DEN-treated rats receiving no proliferative

  1. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  2. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  3. A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction

    Directory of Open Access Journals (Sweden)

    Rajaa Filali

    2014-01-01

    Full Text Available The Session Initiation Protocol (SIP is an application layer signaling protocol used to create, manage, and terminate sessions in an IP based network. SIP is considered as a transactional protocol. There are two main SIP transactions, the INVITE transaction and the non-INVITE transaction. The SIP INVITE transaction specification is described in an informal way in Request for Comments (RFC 3261 and modified in RFC 6026. In this paper we focus on the INVITE transaction of SIP, over reliable and unreliable transport mediums, which is used to initiate a session. In order to ensure the correctness of SIP, the INVITE transaction is modeled and verified using event-B method and its Rodin platform. The Event-B refinement concept allows an incremental development by defining the studied system at different levels of abstraction, and Rodin discharges almost all proof obligations at each level. This interaction between modeling and proving reduces the complexity and helps in assuring that the INVITE transaction SIP specification is correct, unambiguous, and easy to understand.

  4. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    Science.gov (United States)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  5. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  6. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  7. Application Framework with Abstractions for Protocol and Agent Role

    DEFF Research Database (Denmark)

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent ...... roles are supported by a simple and expressive application framework....

  8. Maine Tidal Power Initiative: Environmental Impact Protocols For Tidal Power

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Michael Leroy [Univ. of Maine, Orono, ME; Zydlewski, Gayle Barbin [Univ. of Maine, Orono, ME; Xue, Huijie [Univ. of Maine, Orono, ME; Johnson, Teresa R. [Univ. of Maine, Orono, ME

    2014-02-02

    The Maine Tidal Power Initiative (MTPI), an interdisciplinary group of engineers, biologists, oceanographers, and social scientists, has been conducting research to evaluate tidal energy resources and better understand the potential effects and impacts of marine hydro-kinetic (MHK) development on the environment and local community. Project efforts include: 1) resource assessment, 2) development of initial device design parameters using scale model tests, 3) baseline environmental studies and monitoring, and 4) human and community responses. This work included in-situ measurement of the environmental and social response to the pre-commercial Turbine Generator Unit (TGU®) developed by Ocean Renewable Power Company (ORPC) as well as considering the path forward for smaller community scale projects.

  9. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  10. Decentralized session initiation protocol solution in ad hoc networks

    Science.gov (United States)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  11. Scoping review protocol: education initiatives for medical psychiatry collaborative care.

    Science.gov (United States)

    Shen, Nelson; Sockalingam, Sanjeev; Abi Jaoude, Alexxa; Bailey, Sharon M; Bernier, Thérèse; Freeland, Alison; Hawa, Aceel; Hollenberg, Elisa; Woldemichael, Bethel; Wiljer, David

    2017-09-03

    The collaborative care model is an approach providing care to those with mental health and addictions disorders in the primary care setting. There is a robust evidence base demonstrating its clinical and cost-effectiveness in comparison with usual care; however, the transitioning to this new paradigm of care has been difficult. While there are efforts to train and prepare healthcare professionals, not much is known about the current state of collaborative care training programmes. The objective of this scoping review is to understand how widespread these collaborative care education initiatives are, how they are implemented and their impacts. The scoping review methodology uses the established review methodology by Arksey and O'Malley. The search strategy was developed by a medical librarian and will be applied in eight different databases spanning multiple disciplines. A two-stage screening process consisting of a title and abstract scan and a full-text review will be used to determine the eligibility of articles. To be included, articles must report on an existing collaborative care education initiative for healthcare providers. All articles will be independently assessed for eligibility by pairs of reviewers, and all eligible articles will be abstracted and charted in duplicate using a standardised form. The extracted data will undergo a 'narrative review' or a descriptive analysis of the contextual or process-oriented data and simple quantitative analysis using descriptive statistics. Research ethics approval is not required for this scoping review. The results of this scoping review will inform the development of a collaborative care training initiative emerging from the Medical Psychiatry Alliance, a four-institution philanthropic partnership in Ontario, Canada. The results will also be presented at relevant national and international conferences and published in a peer-reviewed journal. © Article author(s) (or their employer(s) unless otherwise stated in

  12. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...

  13. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  14. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  15. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  16. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  17. A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks

    Science.gov (United States)

    2001-01-01

    00-00-2001 to 00-00-2001 4. TITLE AND SUBTITLE A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Netowrks 5a. CONTRACT NUMBER...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE

  18. The micro-habitat methodology. Application protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sabaton, C; Valentin, S; Souchon, Y

    1995-06-01

    A strong need has been felt for guidelines to help various entities in applying the micro-habitat methodology, particularly in impact studies on hydroelectric installations. CEMAGREF and Electricite de France have developed separately two protocols with five major steps: reconnaissance of the river, selection of representative units to be studied in greater depth, morpho-dynamic measurements at one or more rates of discharge and hydraulic modeling, coupling of hydraulic and biological models, calculation of habitat-quality scores for fish, analysis of results. The two approaches give very comparable results and are essentially differentiated by the hydraulic model used. CEMAGREF uses a one-dimensional model requiring measurements at only one discharge rate. Electricite de France uses a simplified model based on measurements at several rates of discharge. This approach is possible when discharge can be controlled in the study area during data acquisition, as is generally the case downstream of hydroelectric installations. The micro-habitat methodology is now a fully operational tool with which to study changes in fish habitat quality in relation to varying discharge. It provides an element of assessment pertinent to the choice of instreaming flow to be maintained downstream of a hydroelectric installation; this information is essential when the flow characteristics (velocity, depth) and the nature of the river bed are the preponderant factors governing habitat suitability for trout or salmon. The ultimate decision must nonetheless take into account any other potentially limiting factors for the biocenoses on the one hand, and the target water use objectives on the other. In many cases, compromises must be found among different uses, different species and different stages in the fish development cycle. (Abstract Truncated)

  19. FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue are available here.   Human Resources Division Tel. 74469

  20. On the design of application protocols

    NARCIS (Netherlands)

    van Sinderen, Marten J.

    1995-01-01

    In the last decades, much effort has been spent on the design and provision of sophisticated communication infrastructures. The development of end-user oriented distributed system applications, leaning on top of these communication infrastructures, so far has attracted little attention. This is

  1. Network Coding Protocols for Data Gathering Applications

    DEFF Research Database (Denmark)

    Nistor, Maricica; Roetter, Daniel Enrique Lucani; Barros, João

    2015-01-01

    Tunable sparse network coding (TSNC) with various sparsity levels of the coded packets and different feedback mechanisms is analysed in the context of data gathering applications in multi-hop networks. The goal is to minimize the completion time, i.e., the total time required to collect all data ...

  2. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  3. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically

  4. Influence of Whitening Gel Application Protocol on Dental Color Change

    Directory of Open Access Journals (Sweden)

    Taciana Marco Ferraz Caneppele

    2015-01-01

    Full Text Available Objectives. To evaluate the influence of different whitening protocols on the efficacy of 35% hydrogen peroxide (HP tooth whitening and gel pH and concentration. Material and Methods. Eighty-four enamel/dentin discs from bovine incisors were used. The baseline color was measured with a spectrophotometer. Two sessions of in-office whitening with 35% HP were performed under different protocols: G1: 3 applications of HP (10 min each per session; G2: 1 application of 30 min per session; G3: 1 application of 40 min per session, with no gel replenishment within session for groups 2 and 3. HP titration and pH evaluation at baseline, after 10, 30, and 40 min were also performed. The final color was measured 24 h after the 1st and 2nd whitening sessions. Data were submitted to Repeated Measures ANOVA and Tukey’s test. Results. For color evaluation, no differences were observed among groups after two sessions. HP titration showed no drop on concentration after 10, 30, or 40 min. The pH was 5.54 at baseline and 5.41 after 40 min. Conclusion. Replenishment or extended application time of in-office whitening gel does not affect gel pH and concentration, a fact that supports the similar effectiveness of whitening observed among the tested protocols.

  5. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  6. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  7. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    OpenAIRE

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  8. Remote control of the industry processes. POWERLINK protocol application

    Science.gov (United States)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  9. Uma aplicação de voz sobre IP baseada no Session Initiation Protocol

    OpenAIRE

    Maia da Silva Junior, Jucimar

    2006-01-01

    Neste trabalho é implementada uma aplicação de Voz Sobre IP utilizando o Session Initiation Protocol (SIP) como protocolo de sinalização. Para alcançar este objetivo, são analisadas algumas tecnologias importantes, como os protocolos da Internet Engineering Task Force (IETF) para Telefonia IP, codificadores de voz, e a utilização da aplicação para verificação de atrasos, jitter e perda de pacotes. A aplicação foi desenvolvida em Java e pode facilmente ser modificada para adequa...

  10. Evaluation of quality improvement initiative in pediatric oncology: implementation of aggressive hydration protocol.

    Science.gov (United States)

    Fratino, Lisa M; Daniel, Denise A; Cohen, Kenneth J; Chen, Allen R

    2009-01-01

    Our goal was to improve the efficiency of chemotherapy administration for pediatric oncology patients. We identified prechemotherapy hydration as the process that most often delayed chemotherapy administration. An aggressive hydration protocol, supported by fluid order sets, was developed for patients receiving planned chemotherapy. The mean interval from admission to achieving adequate hydration status was reduced significantly from 4.9 to 1.4 hours with a minor reduction in the time to initiate chemotherapy from 9.6 to 8.6 hours. Chemotherapy availability became the new rate-limiting process.

  11. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  12. Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Orfanidis, Charalampos; Dragoni, Nicola

    2014-01-01

    In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. In the case of multiple senders having traffic for a given receiver, such beacons form...... points where collisions are likely to happen. In this paper, we present altruistic backoff (AB), a novel collision avoidance mechanism that aims to avoid collisions before the transmission of a beacon. As a result of an early backoff, senders spend less time in idle listening waiting for a beacon, thus...... saving significant amounts of energy. We present an implementation of AB for Texas Instruments' eZ430-rf2500 sensor nodes and we evaluate its performance with simulations and experiments....

  13. Long-term outcome of intensive initial immunosuppression protocol in pediatric deceased donor renal transplantation.

    LENUS (Irish Health Repository)

    Olaitan, Oyedolamu K

    2010-02-01

    To report the long-term outcome of deceased donor kidney transplantation in children with emphasis on the use of an intensive initial immunosuppression protocol using R-ATG as antibody induction. Between January 1991 and December 1997, 82 deceased donor kidney transplantations were performed in 75 pediatric recipients. Mean recipient age at transplantation was 12.9 yr and the mean follow-up period was 12.6 yr. All patients received quadruple immunosuppression with steroid, cyclosporine, azathioprine, and antibody induction using R-ATG-Fresenius. Actual one, five, and 10 yr patient survival rates were 99%, 97%, and 94%, respectively; only one patient (1.2%) developed PTLD. Actual one, five, and 10 yr overall graft survival rates were 84%, 71%, and 50%, respectively; there were five cases (6%) of graft thrombosis and the actual immunological graft survival rates were 91%, 78%, and 63% at one, five, and 10 yr, respectively. The use of an intensive initial immunosuppression protocol with R-ATG as antibody induction is safe and effective in pediatric recipients of deceased donor kidneys with excellent immunological graft survival without an increase in PTLD or other neoplasms over a minimum 10-yr follow up.

  14. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  15. The Use of Grid Storage Protocols for Healthcare Applications

    CERN Document Server

    Donno, F; CERN. Geneva. IT Department

    2008-01-01

    Grid computing has attracted worldwide attention for a variety of domains. Healthcare projects focus on data mining and standardization techniques, the issue of data accessibility and transparency over the storage systems on the Grid has seldom been tackled. In this position paper, we identify the key issues and requirements imposed by Healthcare applications and point out how Grid Storage Technology can be used to satisfy those requirements. The main contribution of this work is the identification of the characteristics and protocols that make Grid Storage technology attractive for building a Healthcare data storage infrastructure.

  16. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Directory of Open Access Journals (Sweden)

    Alvaro Carvajal-Flórez

    2016-04-01

    Full Text Available ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS of the American Board of Orthodontics (ABO. Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG consisted of 17 patients (19.88 ± 4.4 years old treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old selected by stratified randomization without finishing intervention (CG. Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048, respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8 (p = 0.009 and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6 (p = 0.007. Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8 (p = 0.62 and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9 (p = 0.65. Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system.

  17. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  18. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  19. Symbolic initiative and its application to computers

    Energy Technology Data Exchange (ETDEWEB)

    Hellerman, L

    1982-01-01

    The author reviews the role of symbolic initiative in mathematics and then defines a sense in which computers compute mathematical functions. This allows a clarification of the semantics of computer and communication data. Turing's view of machine intelligence is examined in terms of its use of symbolic initiative. 12 references.

  20. A protocol for the retina surgeon’s safe initial intravitreal injections

    Directory of Open Access Journals (Sweden)

    Ronald EP Frenkel

    2010-11-01

    Full Text Available Ronald EP Frenkel1,2, Shamim A Haji1,2, Melvin La1, Max PC Frenkel1, Angela Reyes11Eye Research Foundation, Stuart, FL, USA; 2East Florida Eye Institute, Stuart, FL, USAPurpose: To determine the safety of a surgeon’s initial consecutive intravitreal injections using a specific protocol and to review the complications that may be attributed to the injection procedure.Design: A retrospective chart review.Participants: Fifty-nine patients (30 females, 29 males received intravitreal injections of pegaptanib, bevacizumab, or ranibizumab as part of their treatment for neovascular age-related macular degeneration. The average patient age was 80 years. Twenty-two patients were diagnosed with or suspected of having glaucoma. Each patient received an average of 5.8 injections.Methods: The charts of 59 patients who received a total of 345 intravitreal injections (104 pegaptanib, 74 bevacizumab, 167 ranibizumab were reviewed. All injections were performed in an office-based setting. Povidone–iodine, topical antibiotics, and eye speculum were used as part of the pre injection procedure. Vision and intraocular pressure were evaluated immediately following each injection.Main outcome measures: Incidence of post injection complications, including but not limited to endophthalmitis, retinal detachment, traumatic cataract, and vitreous hemorrhage.Results: There were no cases of endophthalmitis, toxic reactions, traumatic cataracts, retinal detachment, or vitreous hemorrhage. There was one case each of lid swelling, transient floaters, retinal pigment epithelial tear, corneal edema, and corneal abrasion. There were five cases of transient no light perception following pegaptanib injections.Conclusion: The incidence of serious complications was very low for the intravitreal injections given. A surgeon’s initial intravitreal injections may be performed with a very high degree of safety using this protocol.Keywords: intravitreal injection, post injection

  1. A Distance Bounding Protocol for Location-Cloaked Applications.

    Science.gov (United States)

    Molina-Martínez, Cristián; Galdames, Patricio; Duran-Faundez, Cristian

    2018-04-26

    Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP)—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier) may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover). However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation.

  2. A Distance Bounding Protocol for Location-Cloaked Applications

    Directory of Open Access Journals (Sweden)

    Cristián Molina-Martínez

    2018-04-01

    Full Text Available Location-based services (LBSs assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover. However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation.

  3. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  4. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  5. [Peripheral vertigo versus central vertigo. Application of the HINTS protocol].

    Science.gov (United States)

    Batuecas-Caletrío, Ángel; Yáñez-González, Raquel; Sánchez-Blanco, Carmen; González-Sánchez, Enrique; Benito, José; Gómez, José Carlos; Santa Cruz-Ruiz, Santiago

    2014-10-16

    One of the most important dilemmas concerning vertigo in emergency departments is its differential diagnosis. There are highly sensitive warning signs in the examination that can put us on the path towards finding ourselves before a case of central vertigo. To determine how effective the application of the HINTS protocol is in the diagnosis of cerebrovascular accidents that mimics peripheral vertigo. We conducted a descriptive observation-based study on patients admitted to hospital with a diagnosis of acute vestibular syndrome in the emergency department. All the patients were monitored on a day-to-day basis until their symptoms improved, with information about nystagmus, the oculocephalic manoeuvre and the skew test. The results from the magnetic resonance imaging study were compared with the alteration of any of those three signs during the time the patient was hospitalised. Altogether 91 patients were examined, with a mean age of 55.8 years. A cerebrovascular accident was observed in eight cases. Of these (mean age: 71 years), in seven of them there were alterations in some of the HINTS signs, and in one case the study was normal (sensitivity: 0.88; specificity: 0.96). All of them had some vascular risk factor. Faced with a patient who visits the emergency department with an acute vestibular syndrome, a suitably directed examination is essential to be able to establish the differential diagnosis between peripheral and central pathology, since some cerebrovascular accidents can present with the appearance of acute vertigo. Applying a protocol like HINTS makes it possible to suspect the central pathology with a high degree of sensitivity and specificity.

  6. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    Moeller, S; Newe, T; Lochmann, S

    2009-01-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  7. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    Science.gov (United States)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  8. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  9. A nurse-initiated pain protocol in the ED improves pain treatment in patients with acute musculoskeletal pain

    NARCIS (Netherlands)

    Pierik, J.G.; Berben, S.A.A.; IJzerman, M.J.; Gaakeer, M.I.; Eenennaam, F.L. van; Vugt, A.B. van; Doggen, C.J.

    2016-01-01

    While acute musculoskeletal pain is a frequent complaint, its management is often neglected. An implementation of a nurse-initiated pain protocol based on the algorithm of a Dutch pain management guideline in the emergency department might improve this. A pre-post intervention study was performed as

  10. A nurse-initiated pain protocol in the ED improves pain treatment in patients with acute musculoskeletal pain

    NARCIS (Netherlands)

    Pierik, Jorien; Berben, Sivera A.; IJzerman, Maarten Joost; Gaakeer, Menno I.; Eenennaam, Fred L.; van Vugt, Arie B.; Doggen, Catharina Jacoba Maria

    2016-01-01

    While acute musculoskeletal pain is a frequent complaint, its management is often neglected. An implementation of a nurse-initiated pain protocol based on the algorithm of a Dutch pain management guideline in the emergency department might improve this. A pre–post intervention study was performed as

  11. Using the "Knowledge Quartet" to Quantify Mathematical Knowledge in Teaching: The Development of a Protocol for Initial Teacher Education

    Science.gov (United States)

    Weston, Tracy L.

    2013-01-01

    This study examined trainee teachers' mathematical knowledge in teaching (MKiT) over their final year in a US Initial Teacher Education (ITE) programme. This paper reports on an exploratory methodological approach taken to use the "Knowledge Quartet" to quantify MKiT through the development of a new protocol to code trainees' teaching of…

  12. Assessing impacts of roads: application of a standard assessment protocol

    Science.gov (United States)

    Duniway, Michael C.; Herrick, Jeffrey E.

    2013-01-01

    Adaptive management of road networks depends on timely data that accurately reflect the impacts those systems are having on ecosystem processes and associated services. In the absence of reliable data, land managers are left with little more than observations and perceptions to support management decisions of road-associated disturbances. Roads can negatively impact the soil, hydrologic, plant, and animal processes on which virtually all ecosystem services depend. The Interpreting Indicators of Rangeland Health (IIRH) protocol is a qualitative method that has been demonstrated to be effective in characterizing impacts of roads. The goal of this study were to develop, describe, and test an approach for using IIRH to systematically evaluate road impacts across large, diverse arid and semiarid landscapes. We developed a stratified random sampling approach to plot selection based on ecological potential, road inventory data, and image interpretation of road impacts. The test application on a semiarid landscape in southern New Mexico, United States, demonstrates that the approach developed is sensitive to road impacts across a broad range of ecological sites but that not all the types of stratification were useful. Ecological site and road inventory strata accounted for significant variability in the functioning of ecological processes but stratification based on apparent impact did not. Analysis of the repeatability of IIRH applied to road plots indicates that the method is repeatable but consensus evaluations based on multiple observers should be used to minimize risk of bias. Landscape-scale analysis of impacts by roads of contrasting designs (maintained dirt or gravel roads vs. non- or infrequently maintained roads) suggests that future travel management plans for the study area should consider concentrating traffic on fewer roads that are well designed and maintained. Application of the approach by land managers will likely provide important insights into

  13. The Promises and Challenges of Ecological Momentary Assessment in Schizophrenia: Development of an Initial Experimental Protocol

    Directory of Open Access Journals (Sweden)

    Brandon A. Gaudiano

    2015-07-01

    Full Text Available Severe mental illnesses, including schizophrenia and other psychotic-spectrum disorders, are a major cause of disability worldwide. Although efficacious pharmacological and psychosocial interventions have been developed for treating patients with schizophrenia, relapse rates are high and long-term recovery remains elusive for many individuals. Furthermore, little is still known about the underlying mechanisms of these illnesses. Thus, there is an urgent need to better understand the contextual factors that contribute to psychosis so that they can be better targeted in future interventions. Ecological Momentary Assessment (EMA is a dynamic procedure that permits the measurement of variables in natural settings in real-time through the use of brief assessments delivered via mobile electronic devices (i.e., smartphones. One advantage of EMA is that it is less subject to retrospective memory biases and highly sensitive to fluctuating environmental factors. In the current article, we describe the research-to-date using EMA to better understand fluctuating symptoms and functioning in patients with schizophrenia and other psychotic disorders and potential applications to treatment. In addition, we describe a novel EMA protocol that we have been employing to study the outcomes of patients with schizophrenia following a hospital discharge. We also report the lessons we have learned thus far using EMA methods in this challenging clinical population.

  14. VIIRS Marine Isoprene Product and Initial Applications

    Science.gov (United States)

    Tong, D.; Wang, M.; Wang, B.; Pan, L.; Lee, P.; Goldberg, M.

    2017-12-01

    Isoprene is a reactive biogenic hydrocarbon that affects atmospheric chemistry, aerosol loading, and cloud formation. We have developed a marine isoprene emission algorithm based on ocean color data from the Visible Infrared Imaging Radiometer Suite (VIIRS) onboard the Suomi National Polar-orbiting Partnership (SNPP). and global meteorology simulated by NOAA Global Forecasting System (GFS). This algorithm is implemented to generate a multi-year data record (2012-2015) of marine isoprene. The product was validated using historic ocean observations of marine isoprene, as well as in-situ data collected during two recent cruises (SPACES/OASIS in 2014 and ASTRA-OMZ in 2015). Result shows that the VIIRS product has captured the seasonal and spatial variability of global oceanic isoprene emission, which is controlled by a myriad of biological and environmental variables including chlorophyll-a concentration, phytoplankton functional types, seawater light attenuation rate, wind speed, and sea surface temperature. The VIIRS isoprene emission displays considerable seasonal and spatial variations, with peaks in spring over seawater abundant with nutrient inputs. Year to year variations are small, with the annual global emissions ranging from 0.20 to 0.25 Tg C/yr. This new dataset provides the first multi-year observations of global isoprene emissions that can be used to study a variety of environmental issues such as coastal air quality, global aerosol, and cloud formation. Some "early-adopter" applications of this product are briefly discussed.

  15. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience

    Energy Technology Data Exchange (ETDEWEB)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang [The First Affiliated Hospital of Zhengzhou University, Department of Radiology, Zhengzhou, Henan Province (China)

    2017-01-15

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80) each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. (orig.)

  16. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience

    International Nuclear Information System (INIS)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80) each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. (orig.)

  17. Initiating Events Modeling for On-Line Risk Monitoring Application

    International Nuclear Information System (INIS)

    Simic, Z.; Mikulicic, V.

    1998-01-01

    In order to make on-line risk monitoring application of Probabilistic Risk Assessment more complete and realistic, a special attention need to be dedicated to initiating events modeling. Two different issues are of special importance: one is how to model initiating events frequency according to current plant configuration (equipment alignment and out of service status) and operating condition (weather and various activities), and the second is how to preserve dependencies between initiating events model and rest of PRA model. First, the paper will discuss how initiating events can be treated in on-line risk monitoring application. Second, practical example of initiating events modeling in EPRI's Equipment Out of Service on-line monitoring tool will be presented. Gains from application and possible improvements will be discussed in conclusion. (author)

  18. Application of Quantum Process Calculus to Higher Dimensional Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Simon J. Gay

    2014-07-01

    Full Text Available We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science. We have extended the quantum process calculus to describe d-dimensional quantum systems, which has not been done before. We summarise the necessary theory in the generalisation of quantum gates and Bell states and use the theory to apply the quantum process calculus CQP to quantum protocols, namely qudit teleportation and superdense coding.

  19. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience.

    Science.gov (United States)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80 each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. • Automatic spectral imaging protocol selection provides appropriate scan protocols. • Abdominal CT is feasible using spectral imaging and 300 mgI/kg contrast agent. • 50-keV monochromatic images with 50 % ASIR provide optimal image quality.

  20. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  1. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  2. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  3. 9 CFR 2.11 - Denial of initial license application.

    Science.gov (United States)

    2010-01-01

    ... have violated any Federal, State, or local laws or regulations pertaining to animal cruelty within 1... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Denial of initial license application. 2.11 Section 2.11 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT...

  4. Characterisation of immune responses in healthy foals when a multivalent vaccine protocol was initiated at age 90 or 180 days.

    Science.gov (United States)

    Davis, E G; Bello, N M; Bryan, A J; Hankins, K; Wilkerson, M

    2015-11-01

    Protection from infectious disease requires antigen-specific immunity. In foals, most vaccine protocols are delayed until 6 months to avoid maternal antibody interference. Susceptibility to disease may exist prior to administration of vaccination at age 4-6 months. The aim of this investigation was to characterise immune activation among healthy foals in response to a multivalent vaccine protocol and compare immune responses when foals were vaccinated at age either 90 or 180 days. Randomised block design. Twelve healthy foals with colostral transfer were blocked for age and randomly assigned to vaccination at age 90 days (treatment) or at age 180 days (control). Vaccination protocols included a 3-dose series and booster vaccine administered at age 11 months. Immune response following vaccination at age 90 or 180 days was comparable for several measures of cellular immunity. Antigen specific CD4+ and CD8+ expression of interleukin-4, interferon-γ and granzyme B to eastern equine encephalomyelitis, western equine encephalomyelitis, West Nile virus, tetanus toxoid, equine influenza and equine herpesvirus-1/4 antigens were evident for both groups 30 days after initial vaccine and at age 344 days. Both groups showed a significant increase in antigen-specific immunoglobulin G expression following booster vaccine at age 11 months, thereby indicating memory immune responses. The data presented in this report demonstrate that young foals are capable of immune activation following a 3-dose series with a multivalent vaccine, despite presence of maternal antibodies. Although immune activation does not automatically confer protection, several of the immune indicators measured showed comparable expression in foals vaccinated at 3 months relative to control foals vaccinated at age 6 months. In high-risk situations where immunity may be required earlier than following a conventional vaccine series, our data provide evidence that foals respond to immunisation initiated at 3 months

  5. The Application of RPL Routing Protocol in Low Power Wireless Sensor and Lossy Networks

    Directory of Open Access Journals (Sweden)

    Xun Yang

    2014-05-01

    Full Text Available With the continuous development of computer information technology, wireless sensor has been successfully changed the mode of human life, at the same time, as one of the technologies continues to improve the future life, how to better integration with the RPL routing protocols together become one of research focuses in the current climate. This paper start from the wireless sensor network, briefly discusses the concept, followed by systematic exposition of RPL routing protocol developed background, relevant standards, working principle, topology and related terms, and finally explore the RPL routing protocol in wireless sensor low power lossy network applications.

  6. Application of Protocol-Oriented MVVM Architecture in iOS Development

    OpenAIRE

    Luong Nguyen, Khoi Nguyen

    2017-01-01

    The mobile application industry is fast paced. Requirements change, additions of new features occur on a daily basis and demand frequent code structure adjustment. Thus, a flexible and maintainable software architecture is often a key factor for an application’s success. The major objective of this thesis is to propose a practical use case of Protocol Oriented Model View View Model, an architecture inspired by the Protocol Oriented Programming paradigm. This thesis explains the architectur...

  7. Optimization of Nonambulant Mass Casualty Decontamination Protocols as Part of an Initial or Specialist Operational Response to Chemical Incidents.

    Science.gov (United States)

    Chilcott, Robert P; Mitchell, Hannah; Matar, Hazem

    2018-05-30

    The UK's Initial Operational Response (IOR) is a new process for improving the survival of multiple casualties following a chemical, biological, radiological or nuclear incident. Whilst the introduction of IOR represents a patient-focused response for ambulant casualties, there is currently no provision for disrobe and dry decontamination of nonambulant casualties. Moreover, the current specialist operational response (SOR) protocol for nonambulant casualty decontamination (also referred to as "clinical decontamination") has not been subject to rigorous evaluation or development. Therefore, the aim of this study was to confirm the effectiveness of putatively optimized dry (IOR) and wet (SOR) protocols for nonambulant decontamination in human volunteers. Dry and wet decontamination protocols were objectively evaluated using human volunteers. Decontamination effectiveness was quantified by liquid chromatography-mass spectrometry analysis of the recovery of a chemical warfare agent simulant (methylsalicylate) from skin and hair of volunteers, with whole-body fluorescence imaging to quantify the skin distribution of residual simulant. Both the dry and wet decontamination processes were rapid (3 and 4 min, respectively) and were effective in removing simulant from the hair and skin of volunteers, with no observable adverse effects related to skin surface spreading of contaminant. Further studies are required to assess the combined effectiveness of dry and wet decontamination under more realistic conditions and to develop appropriate operational procedures that ensure the safety of first responders.

  8. Modelling a New Product Model on the Basis of an Existing STEP Application Protocol

    Directory of Open Access Journals (Sweden)

    B.-R. Hoehn

    2005-01-01

    Full Text Available During the last years a great range of computer aided tools has been generated to support the development process of various products. The goal of a continuous data flow, needed for high efficiency, requires powerful standards for the data exchange. At the FZG (Gear Research Centre of the Technical University of Munich there was a need for a common gear data format for data exchange between gear calculation programs. The STEP standard ISO 10303 was developed for this type of purpose, but a suitable definition of gear data was still missing, even in the Application Protocol AP 214, developed for the design process in the automotive industry. The creation of a new STEP Application Protocol or the extension of existing protocol would be a very time consumpting normative process. So a new method was introduced by FZG. Some very general definitions of an Application Protocol (here AP 214 were used to determine rules for an exact specification of the required kind of data. In this case a product model for gear units was defined based on elements of the AP 214. Therefore no change of the Application Protocol is necessary. Meanwhile the product model for gear units has been published as a VDMA paper and successfully introduced for data exchange within the German gear industry associated with FVA (German Research Organisation for Gears and Transmissions. This method can also be adopted for other applications not yet sufficiently defined by STEP. 

  9. Initialization, conceptualization, and application in the generalized (fractional) calculus.

    Science.gov (United States)

    Lorenzo, Carl F; Hartley, Tom T

    2007-01-01

    This paper provides a formalized basis for initialization in the fractional calculus. The intent is to make the fractional calculus readily accessible to engineering and the sciences. A modified set of definitions for the fractional calculus is provided which formally include the effects of initialization. Conceptualizations of fractional derivatives and integrals are shown. Physical examples of the basic elements from electronics are presented along with examples from dynamics, material science, viscoelasticity, filtering, instrumentation, and electrochemistry to indicate the broad application of the theory and to demonstrate the use of the mathematics. The fundamental criteria for a generalized calculus established by Ross (1974) are shown to hold for the generalized fractional calculus under appropriate conditions. A new generalized form for the Laplace transform of the generalized differintegral is derived. The concept of a variable structure (order) differintegral is presented along with initial efforts toward meaningful definitions.

  10. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    OpenAIRE

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the protocol-centred paradigm. We argue that interaction systems that support application-level interactions should be explicitly designed, using the externally observable behaviour of the interaction ...

  11. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  12. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  13. OverView of Space Applications for Environment (SAFE) initiative

    Science.gov (United States)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  14. OverView of Space Applications for Environment (SAFE) initiative

    International Nuclear Information System (INIS)

    Hamamoto, Ko; Fukuda, Toru; Nukui, Tomoyuki; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi

    2014-01-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes

  15. Knowledge Translation Interventions to Improve the Timing of Dialysis Initiation: Protocol for a Cluster Randomized Trial.

    Science.gov (United States)

    Chau, Elaine M T; Manns, Braden J; Garg, Amit X; Sood, Manish M; Kim, S Joseph; Naimark, David; Nesrallah, Gihad E; Soroka, Steven D; Beaulieu, Monica; Dixon, Stephanie; Alam, Ahsan; Tangri, Navdeep

    2016-01-01

    Early initiation of chronic dialysis (starting dialysis with higher vs lower kidney function) has risen rapidly in the past 2 decades in Canada and internationally, despite absence of established health benefits and higher costs. In 2014, a Canadian guideline on the timing of dialysis initiation, recommending an intent-to-defer approach, was published. The objective of this study is to evaluate the efficacy and safety of a knowledge translation intervention to promote the intent-to-defer approach in clinical practice. This study is a multicenter, 2-arm parallel, cluster randomized trial. The study involves 55 advanced chronic kidney disease clinics across Canada. Patients older than 18 years who are managed by nephrologists for more than 3 months, and initiate dialysis in the follow-up period are included in the study. Outcomes will be measured at the patient-level and enumerated within a cluster. Data on characteristics of each dialysis start will be determined by linkages with the Canadian Organ Replacement Register. Primary outcomes include the proportion of patients who start dialysis early with an estimated glomerular filtration rate greater than 10.5 mL/min/1.73 m 2 and start dialysis in hospital as inpatients or in an emergency room setting. Secondary outcomes include the rate of change in early dialysis starts; rates of hospitalizations, deaths, and cost of predialysis care (wherever available); quarterly proportion of new starts; and acceptability of the knowledge translation materials. We randomized 55 multidisciplinary chronic disease clinics (clusters) in Canada to receive either an active knowledge translation intervention or no intervention for the uptake of the guideline on the timing of dialysis initiation. The active knowledge translation intervention consists of audit and feedback as well as patient- and provider-directed educational tools delivered at a comprehensive in-person medical detailing visit. Control clinics are only exposed to guideline

  16. Software application for quality control protocol of mammography systems

    International Nuclear Information System (INIS)

    Kjosevski, Vladimir; Gershan, Vesna; Ginovska, Margarita; Spasevska, Hristina

    2010-01-01

    Considering the fact that the Quality Control of the technological process of the mammographic system involves testing of a large number of parameters, it is clearly evident that there is a need for using the information technology for gathering, processing and storing of all the parameters that are result of this process. The main goal of this software application is facilitation and automation of the gathering, processing, storing and presenting process of the data related to the qualification of the physical and technical parameters during the quality control of the technological process of the mammographic system. The software application along with its user interface and database has been made with the Microsoft Access 2003 application which is part of the Microsoft Office 2003 software packet and has been chosen as a platform for developing because it is the most commonly used office application today among the computer users in the country. This is important because it will provide the end users a familiar environment to work in, without the need for additional training and improving the computer skills that they posses. Most importantly, the software application is easy to use, fast in calculating the parameters needed and it is an excellent way to store and display the results. There is a possibility for up scaling this software solution so it can be used by many different users at the same time over the Internet. It is highly recommended that this system is implemented as soon as possible in the quality control process of the mammographic systems due to its many advantages.(Author)

  17. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    CERN Document Server

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko

    2012-01-01

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  18. Considerations preliminary to the application of early and immediate loading protocols in dental implantology.

    Science.gov (United States)

    Szmukler-Moncler, S; Piattelli, A; Favero, G A; Dubruille, J H

    2000-02-01

    In oral implantology, a 3-6 month stress-free healing period is presently accepted as a prerequisite to achieve bone apposition without interposition of a fibrous scar tissue. This protocol was introduced by Brånemark and co-workers in 1977. The aim of the present paper is to review the reasons that led Brånemark and collaborators to require long delayed loading periods. It is shown that the requirement for long delayed loading periods was drawn from the initiation and development periods of their original clinical trial. Demanding conditions were met involving simultaneously: 1) patients with poor bone quality and quantity, 2) non-optimized implant design, 3) short implants, 4) non-optimized surgical placement, 5) non-optimized surgical protocol and 6) biomechanically non-optimized prosthesis. Extrapolation of the requirement for long healing periods from these particular conditions to more standard situations involving refined surgical protocols and careful patient selection might be questioned. Albeit premature loading has been interpreted as inducing fibrous tissue interposition, immediate loading per se is not responsible for fibrous encapsulation. It is the excess of micromotion during the healing phase that interferes with bone repair. A threshold of tolerated micromotion exists, that is somewhere between 50 microns and 150 microns. It is suggested that loading protocols might be shortened through 2 different approaches. The first way would be to decrease stepwise the delayed loading period for free-standing implants below the presently accepted 3-6 months of healing. The second way would be to identify immediate loading protocols that are capable of keeping the amount of micromotion beneath the threshold of deleterious micromotion. Immediate loading protocols for implants-retained overdentures and fixed bridges are reviewed. It is shown that successful premature loading protocols require a careful and strict patient selection aimed to achieve the best

  19. Implementation Intention for Initiating Intuitive Eating and Active Embodiment in Obese Patients Using a Smartphone Application

    Directory of Open Access Journals (Sweden)

    Damien Brevers

    2017-11-01

    Full Text Available This article describes a study protocol, which aims to explore and describe the feasibility of a mobile-phone application for initiating intuitive eating and intuitive exercising in patients who are following an ambulatory treatment for obesity. Intuitive eating refers to one’s ability to make food choices based on one’s awareness of his/her body’s response. Intuitive exercising encourages people in finding enjoyable ways of being physically active. These two components will be trained using an implementation intention procedure, that is, behavioral plans that aim at creating a strong link between a specified situation and a response. We aim to recruit up to 80 overweight and obese patients over a period of 2 years. The smartphone application will be assessed on the basis of (i data obtained through a 4-week use period, (ii self-report measures taken before and after the use of the mobile application, and (iii feedbacks from participants after the use of the mobile application. This pilot study will allow us to better understand the applicability of the use of mobile application within ambulatory treatment settings, and to adapt the design of the app necessary for building cross-sectional studies investigating its efficacy.

  20. Generally Applicable Transformation Protocols for Fluorescent Nanodiamond Internalization into Cells.

    Science.gov (United States)

    Hemelaar, Simon R; van der Laan, Kiran J; Hinterding, Sophie R; Koot, Manon V; Ellermann, Else; Perona-Martinez, Felipe P; Roig, David; Hommelet, Severin; Novarina, Daniele; Takahashi, Hiroki; Chang, Michael; Schirhagl, Romana

    2017-07-19

    Fluorescent nanodiamonds (FNDs) are promising nanoprobes, owing to their stable and magnetosensitive fluorescence. Therefore they can probe properties as magnetic resonances, pressure, temperature or strain. The unprecedented sensitivity of diamond defects can detect the faint magnetic resonance of a single electron or even a few nuclear spins. However, these sensitivities are only achieved if the diamond probe is close to the molecules that need to be detected. In order to utilize its full potential for biological applications, the diamond particle has to enter the cell. Some model systems, like HeLa cells, readily ingest particles. However, most cells do not show this behavior. In this article we show for the first time generally applicable methods, which are able to transport fluorescent nanodiamonds into cells with a thick cell wall. Yeast cells, in particular Saccharomyces cerevisiae, are a favored model organism to study intracellular processes including aging on a cellular level. In order to introduce FNDs in these cells, we evaluated electrical transformation and conditions of chemical permeabilization for uptake efficiency and viability. 5% DMSO (dimethyl sulfoxide) in combination with optimized chemical transformation mix leads to high uptake efficiency in combination with low impact on cell biology. We have evaluated all steps in the procedure.

  1. REMINDER - FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. Users are requested to apply for a French card through the Users' Office. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue ...

  2. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  3. Heart and Stroke Foundation of Ontario (HSFO high blood pressure strategy's hypertension management initiative study protocol

    Directory of Open Access Journals (Sweden)

    Von Sychowski Shirley

    2008-12-01

    Full Text Available Abstract Background Achieving control of hypertension prevents target organ damage at both the micro and macrovascular level and is a highly cost effective means of lowering the risk for heart attack and stroke particularly in people with diabetes. Clinical trials demonstrate that blood pressure control can be achieved in a large proportion of people. Translating this knowledge into widespread practice is the focus of the Hypertension Management Initiative, which began in 2004 with the goal of improving the management of this chronic health condition by primary care providers and patients in the community. Methods This study will test the effect of a systems change on the management of high blood pressure in real world practice in primary care in Ontario, Canada. The systems change intervention involves an interprofessional educational program bringing together physicians, nurses and pharmacists with tools for both providers and patients to facilitate blood pressure management. Each of two waves of subjects were enrolled over a 6 month period with the initial enrollment between waves separated by 9 months. Blood pressure will be measured with the BpTru ® automated blood pressure device. To determine the effectiveness of the intervention, a before and after analysis within all subjects will compare blood pressure at baseline to annual measurements for the three year study. To assess whether the intervention has an impact on blood pressure control independent of community trends, a betwen group comparison of baseline blood pressures in the delayed wave will be made with the immediate wave during the same time period, so that the immediate wave has experienced the intervention for at least 9 months. The total enrollment goal is 5,000 subjects. The practice locations include 10 Family Health Teams (FHTs and 1 Community Health Centre (CHC and approximately 49 primary care physicians, 15 nurse practitioners, 37 registered nurses and over 150

  4. Efficiency Improvement and Quality Initiatives Application in Financial Institutions

    Directory of Open Access Journals (Sweden)

    MSc. Ajtene Avdullahi

    2015-06-01

    Full Text Available Financial institutions in today’s economy have no longer the luxury to improve profit simply by increasing revenue. These firms, due to the significant measuring reductions in the financial services industry needed to improve operational efficiencies and merely support existing processes with fewer resources. This paper explains the benefits of Lean, Six Sigma, Total Quality Management and Lean Six Sigma that have improved organization's performance, by cutting costs and waste, improving their products or services, increasing profitability as well as enhancing customer satisfaction. The applicability of quality management practices in financial institutions in Kosovo is presented and also their efficiency and effectiveness. By analyzing data from Raiffeisen Bank Kosovo, this paper highlights the benefits of Individual and Micro companies customer segment as the result of organizational change and successful application of quality initiatives from financial institutions in Kosovo.

  5. The Adolescent Girls Initiative-Kenya (AGI-K: study protocol

    Directory of Open Access Journals (Sweden)

    Karen Austrian

    2016-03-01

    Full Text Available Abstract Background Many adolescent girls in Kenya and elsewhere face considerable risks and vulnerabilities that affect their well-being and hinder a safe, healthy, and productive transition into early adulthood. Early adolescence provides a critical window of opportunity to intervene at a time when girls are experiencing many challenges, but before those challenges have resulted in deleterious outcomes that may be irreversible. The Adolescent Girls Initiative-Kenya (AGI-K is built on these insights and designed to address these risks for young adolescent girls. The long-term goal of AGI-K is to delay childbearing for adolescent girls by improving their well-being. Intervention AGI-K comprises nested combinations of different single-sector interventions (violence prevention, education, health, and wealth creation. It will deliver interventions to over 6000 girls between the ages of 11 and 14 years in two marginalized areas of Kenya: 1 Kibera in Nairobi and 2 Wajir County in Northeastern Kenya. The program will use a combination of girl-, household- and community-level interventions. The violence prevention intervention will use community conversations and planning focused on enhancing the value of girls in the community. The educational intervention includes a cash transfer to the household conditioned on school enrollment and attendance. The health intervention is culturally relevant, age-appropriate sexual and reproductive health education delivered in a group setting once a week over the course of 2 years. Lastly, the wealth creation intervention provides savings and financial education, as well as start-up savings. Methods/Design A randomized trial will be used to compare the impact of four different packages of interventions, in order to assess if and how intervening in early adolescence improves girls’ lives after four years. The project will be evaluated using data from behavioural surveys conducted before the start of the program

  6. In vitro protocol for validating interface pressure sensors for therapeutic compression garments: Importance of sphygmomanometer placement and initial cuff diameter

    Directory of Open Access Journals (Sweden)

    Inhwa Jung

    2018-02-01

    Full Text Available An optimal protocol is needed to validate the performance of future interface pressure sensors for compression garments when using a sphygmomanometer. PicoPress® was used on a rigid plastic cylinder (r=4 cm. An FDA-cleared aneroid sphygmomanometer was used to apply pressures from 10-60 mmHg with a diameter of 8 cm or 12 cm placed either beneath the sphygmomanometer’s airbag or fabric cuff. A two-tail t-test was performed (P<0.05 for significance for all applied pressures. PicoPress® outputs vary with sensor placement (airbag vs fabric cuff and the initial cuff diameter. Sensor placement overlying the sphygmomanometer’s fabric cuff compared to the airbag led to significantly higher pressures (37%-135% depending on the cuff diameter size. These differences were nearly all statistically significant (P<0.05. Validation of new interface pressure sensors deploying a sphygmomanometer for calibration should specify the location of sensor placement location and initial diameter with a preference for placement under the airbag.

  7. Fast protocol for radiochromic film dosimetry using a cloud computing web application.

    Science.gov (United States)

    Calvo-Ortega, Juan-Francisco; Pozo, Miquel; Moragues, Sandra; Casals, Joan

    2017-07-01

    To investigate the feasibility of a fast protocol for radiochromic film dosimetry to verify intensity-modulated radiotherapy (IMRT) plans. EBT3 film dosimetry was conducted in this study using the triple-channel method implemented in the cloud computing application (Radiochromic.com). We described a fast protocol for radiochromic film dosimetry to obtain measurement results within 1h. Ten IMRT plans were delivered to evaluate the feasibility of the fast protocol. The dose distribution of the verification film was derived at 15, 30, 45min using the fast protocol and also at 24h after completing the irradiation. The four dose maps obtained per plan were compared using global and local gamma index (5%/3mm) with the calculated one by the treatment planning system. Gamma passing rates obtained for 15, 30 and 45min post-exposure were compared with those obtained after 24h. Small differences respect to the 24h protocol were found in the gamma passing rates obtained for films digitized at 15min (global: 99.6%±0.9% vs. 99.7%±0.5%; local: 96.3%±3.4% vs. 96.3%±3.8%), at 30min (global: 99.5%±0.9% vs. 99.7%±0.5%; local: 96.5%±3.2% vs. 96.3±3.8%) and at 45min (global: 99.2%±1.5% vs. 99.7%±0.5%; local: 96.1%±3.8% vs. 96.3±3.8%). The fast protocol permits dosimetric results within 1h when IMRT plans are verified, with similar results as those reported by the standard 24h protocol. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  8. Controlled initialization of superconducting π-phaseshifters and possible applications

    International Nuclear Information System (INIS)

    Mielke, Olaf; Ortlepp, Thomas; Toepfer, Hannes; Kunert, Juergen; Meyer, Hans-Georg

    2010-01-01

    The rapid single-flux quantum electronics (RSFQ) is a superconducting, naturally digital circuit family which is currently close to being commercially applied. RSFQ is outstanding because of its very low switching energy resulting in very low power consumption. This advantage causes, however, a significant influence of thermal noise. For industrial applications, a certain noise immunity is required which is still a challenge, especially for circuits of higher complexity. Integrating phase-shifting elements is a new concept for further improvements concerning stability against the influence of thermal noise. We have already shown that the implementation of phase-shifting elements significantly reduces the influence of thermal noise on circuit behavior by experimentally analyzing the bit-error rate (Mielke et al 2009 IEEE Trans. Appl. Supercond. 19 621-5). Concepts which are easily implementable in standard niobium technology are especially promising. The π-phaseshifter consists of a superconducting loop which is able to store a single flux quantum. The loop current related to the stored flux creates a well-defined phase shift. To achieve the correct functionality of complex circuits it is essential to store exactly one flux quantum in each π-phaseshifter during the cooling down of the chip. Thus, for studying the feasibility of this new approach, the initialization reliability of the π-phaseshifter needs to be verified. We present an experimental investigation of this reliability to obtain a general assessment for the application of the π-phaseshifter in niobium technology. Furthermore, we compare the configuration shielded by a solid ground plane with a configuration with a ground-plane hole below the π-phaseshifter. Justified by the experimental results we suggest programmable RSFQ circuits based on π-phaseshifters. The characteristics of these devices can be influenced by a controlled initialization of the π-phaseshifter. The fabrication was performed by

  9. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  10. GaN Initiative for Grid Applications (GIGA)

    Energy Technology Data Exchange (ETDEWEB)

    Turner, George [MIT Lincoln Lab., Lexington, MA (United States)

    2015-07-03

    For nearly 4 ½ years, MIT Lincoln Laboratory (MIT/LL) led a very successful, DoE-funded team effort to develop GaN-on-Si materials and devices, targeting high-voltage (>1 kV), high-power, cost-effective electronics for grid applications. This effort, called the GaN Initiative for Grid Applications (GIGA) program, was initially made up of MIT/LL, the MIT campus group of Prof. Tomas Palacios (MIT), and the industrial partner M/A Com Technology Solutions (MTS). Later in the program a 4th team member was added (IQE MA) to provide commercial-scale GaN-on-Si epitaxial materials. A basic premise of the GIGA program was that power electronics, for ubiquitous utilization -even for grid applications - should be closer in cost structure to more conventional Si-based power electronics. For a number of reasons, more established GaN-on-SiC or even SiC-based power electronics are not likely to reach theses cost structures, even in higher manufacturing volumes. An additional premise of the GIGA program was that the technical focus would be on materials and devices suitable for operating at voltages > 1 kV, even though there is also significant commercial interest in developing lower voltage (< 1 kV), cost effective GaN-on-Si devices for higher volume applications, like consumer products. Remarkable technical progress was made during the course of this program. Advances in materials included the growth of high-quality, crack-free epitaxial GaN layers on large-diameter Si substrates with thicknesses up to ~5 μm, overcoming significant challenges in lattice mismatch and thermal expansion differences between Si and GaN in the actual epitaxial growth process. Such thick epilayers are crucial for high voltage operation of lateral geometry devices such as Schottky barrier (SB) diodes and high electron mobility transistors (HEMTs). New “Normally-Off” device architectures were demonstrated – for safe operation of power electronics circuits. The trade-offs between lateral and

  11. Role of chemical carcinogens in epithelial and mesenchymal neoplasms with tumor initiation-promotion protocol and the effect of 13-cis retinoic acid in chemo prevention

    International Nuclear Information System (INIS)

    Bukhari, S.M.H.; Shahzad, S.Q.; Naeem, S.; Qureshi, G.R.; Naveed, I.A.

    2002-01-01

    Objective: To study the effects of chemical carcinogens on epithelial and mesenchymal tumorigenesis with tumor initiation-promotion protocol and the use of 13-cis retinoic acid as a chemo preventive agent. Design: It was an experimental study. Place and Duration of Study: The study was conducted at Postgraduate Medical Institute (PGML) Lahore for 20 weeks. Materials and Methods: Sixty albino rats were divided into six groups of ten of animals each. First group of animals (control) was not given carcinogens and 13-cis retinoic acid in second group DMBA was applied on the dorsal skin in repeated dos of 100 mu g/ml in acetone, twice a weak. In the third group DMBA was given 100 mu g/ml as single dose while TPA was given 10 mu g//ml in acetone, twice a weak after two weeks of DMBA applications. In fourth group only DMBA 100 mu g/ml in acetone was applied as a single dose. In fifth and sixth groups 13-cis retinoic acid was given topically before and after the application of DMBA and TPA. Results: First and fourth groups did not develop any tumor. In second groups 2 animals developed malignant fibrous histiocytoma, 4 squamous cell carcinoma while 1 dysphasia and 1 carcinoma in situ. Third group developed osteoma (3 animals), papilloma (3 animals, squamous cell carcinoma (01) and dysplasia (01). Conclusion: Our results showed that DMBA acts as tumor initiator while TPA as promoter. DMBA also produces tumors itself when given alone in repeated doses. The chemical carcinogens are not only a cause of epithelial carcinogenesis but also responsible for mesenchymal tumorigenesis. 13 cis retinoic acid was equally effective in both stages of tumorigenesis. It also prevents malignant conversion of chemically induced benign tumors. (author)

  12. Feasibility and effectiveness of the baby friendly community initiative in rural Kenya: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Kimani-Murage, Elizabeth W; Kimiywe, Judith; Kabue, Mark; Wekesah, Frederick; Matiri, Evelyn; Muhia, Nelson; Wanjohi, Milka; Muriuki, Peterrock; Samburu, Betty; Kanyuira, James N; Young, Sera L; Griffiths, Paula L; Madise, Nyovani J; McGarvey, Stephen T

    2015-09-28

    Interventions promoting optimal infant and young child nutrition could prevent a fifth of under-5 deaths in countries with high mortality. Poor infant and young child feeding practices are widely documented in Kenya, with potential detrimental effects on child growth, health and survival. Effective strategies to improve these practices are needed. This study aims to pilot implementation of the Baby Friendly Community Initiative (BFCI), a global initiative aimed at promoting optimal infant and young child feeding practices, to determine its feasibility and effectiveness with regards to infant feeding practices, nutrition and health outcomes in a rural setting in Kenya. The study, employing a cluster-randomized trial design, will be conducted in rural Kenya. A total of 12 clusters, constituting community units within the government's Community Health Strategy, will be randomized, with half allocated to the intervention and the other half to the control arm. A total of 812 pregnant women and their respective children will be recruited into the study. The mother-child pairs will be followed up until the child is 6 months old. Recruitment will last approximately 1 year from January 2015, and the study will run for 3 years, from 2014 to 2016. The intervention will involve regular counseling and support of mothers by trained community health workers and health professionals on maternal, infant and young child nutrition. Regular assessment of knowledge, attitudes and practices on maternal, infant and young child nutrition will be done, coupled with assessment of nutritional status of the mother-child pairs and morbidity for the children. Statistical methods will include analysis of covariance, multinomial logistic regression and multilevel modeling. The study is funded by the NIH and USAID through the Program for Enhanced Research (PEER) Health. Findings from the study outlined in this protocol will inform potential feasibility and effectiveness of a community

  13. Applicability of modified burst test data to reactivity initiated accident

    Energy Technology Data Exchange (ETDEWEB)

    Yueh, K., E-mail: yuehky@hotmail.com

    2017-05-15

    A comprehensive irradiated cladding mechanical property dataset was generated by a recently developed modified burst test (MBT) under reactivity initiated accident (RIA) loading conditions [1,2]. The test data contains a wide range of test conditions that could bridge the gap between fast transient test reactor data (short pulse and/or low temperature) and prototypical commercial reactor conditions. This paper documents an evaluation performed to demonstrate the applicability of the MBT data to fuel cladding performance under RIA conditions. The current effort includes a comparison of calculated fuel cladding failure/burst strain for tests conducted at the Japan Atomic Energy Agency's (JAEA) Nuclear Safety Research Reactor (NSRR) to the MBT dataset, and an evaluation of potential mechanisms on how some NSRR tests survived beyond the cladding loading capacity. A simple shell model, coupled with temperature output from the Falcon fuel performance code, was used to calculate the fuel pellet thermal expansion of NSRR tests at the point of failure. The calculated fuel pellet thermal expansion correlates well directly with the MBT data at similar loading conditions. A 3-dimensional (3D) finite element analysis (FEA) model was used to evaluate fuel movement potential during a RIA. The evaluation indicates fuel relocation into the pellet chamfer and later into the dish is possible once a temperature threshold is reached before cladding failure and thus could significantly increase the fuel rod energy absorption capacity in a RIA event.

  14. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  15. Modification of CAS-protocol for improvement of security web-applications from unauthorized access

    Directory of Open Access Journals (Sweden)

    Alexey I Igorevich Alexandrov

    2017-07-01

    Full Text Available Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data. The problem of setting up secure user identification is probably one of the most common tasks, which occur in the process of software development. Today, despite the availability of a large amount of authentication tools, new solutions, mechanisms and technologies are being introduced regularly. Primarily, it is done to increase the security level of data protection against unauthorized access. This article describes the experience of using central user authentication service based on CAS-protocol (CAS – Central Authentication Service and free open source software, analyzing its main advantages and disadvantages and describing the possibility of its modification, which would increase security of web-based information systems from being accessed illegally. The article contains recommendations for setting a maximum time limit for users working on services, integrated with central authentication; and, analyses the research of implementing modern web-technologies while using user authentication system based on CAS-protocol. In addition, it describes the ways of CAS-server modernization for developing additional modules: a module for collecting and analyzing the use of information systems, and another one, for a user management system. Furthermore, CAS-protocol can be used at universities and other organizations for creating a unified information environment in education.

  16. Protocols for atomistic modeling of water uptake into zeolite crystals for thermal storage and other applications

    International Nuclear Information System (INIS)

    Fasano, Matteo; Borri, Daniele; Chiavazzo, Eliodoro; Asinari, Pietro

    2016-01-01

    Highlights: • Numerical protocols for modeling water adsorption and infiltration into zeolite. • A priori screening of new materials for heat storage and desalination is possible. • Water uptake isotherms for bridging atomistic and engineering scales. - Abstract: We report numerical protocols for describing the water uptake process into microporous materials, with special emphasis on zeolite crystals. A better understanding and more predictive tools of the latter process are critical for a number of modern engineering applications, ranging from the optimization of loss free and compact thermal storage plants up to more efficient separation processes. Water sorption (and desorption) is indeed the key physical phenomenon to consider when designing several heat storage cycles, whereas water infiltration is to be studied when concerned with sieving through microporous materials for manufacturing selective membranes (e.g. water desalination by reverse osmosis). Despite the two quite different applications above, in this article we make an effort for illustrating a comprehensive numerical framework for predicting the engineering performances of microporous materials, based on detailed atomistic models. Thanks to the nowadays spectacular progresses in synthesizing an ever increasing number of new materials with desired properties such as zeolite with various concentrations of hydrophilic defects, we believe that the reported tools can possibly guide engineers in choosing and optimizing innovative materials for (thermal) engineering applications in the near future.

  17. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  18. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  19. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Science.gov (United States)

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  20. A Machine-to-Machine protocol benchmark for eHealth applications - Use case: Respiratory rehabilitation.

    Science.gov (United States)

    Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco

    2016-06-01

    M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  2. Probability of crack-initiation and application to NDE

    Energy Technology Data Exchange (ETDEWEB)

    Prantl, G [Nuclear Safety Inspectorate HSK, (Switzerland)

    1988-12-31

    Fracture toughness is a property with a certain variability. When a statistical distribution is assumed, the probability of crack initiation may be calculated for a given problem defined by its geometry and the applied stress. Experiments have shown, that cracks which experience a certain small amount of ductile growth can reliably be detected by acoustic emission measurements. The probability of crack detection by AE-techniques may be estimated using this experimental finding and the calculated probability of crack initiation. (author).

  3. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  4. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  5. Acceptance testing in digital systens of mammography. Protocols applicability; Pruebas de aceptacion en equipos digitales de mamografia. Aplicabilidad de protocolos

    Energy Technology Data Exchange (ETDEWEB)

    Bermudez, R.; Espana, M.L.; Garcia Castanon, P.; Gomez Barrado, A.; Rodriguez Martin, G.; Fernandez Bedoya, B.

    2011-07-01

    Acceptance testing of mammographic imaging systems technical is the first approach in order to guarantee that mammograms will be achieved with the minimun radiation dose compatible with an image quality sutiable for diagnose purposes. The aim of this study is to assess the practical applicability of different protocols in acceptance test of digital mammographyc systems. This study has been carried out on the results of ltyhe acceptance tests of five flat panel digital mammographic systems. Parameters established in the systems technical specifications and those evaluated in the consulted protocols were tested. Due to the fact that the legislation oin our country does not demand to consider a specific protocol, the results obtained were also compared considering different existing protocols. Results show discrepancies between manufacturers limiting values and those established in the protocols. Some parameters, such as the authomatic exposure control compensation and the detector noise, were found out to meet or not the limiting value, depending on the selected protocol. From our results we could suggest, that protocols from manufacturers should be adapted to acknowledged documents on acceptance testing in digital mammography. They buyer representative could even specify the protocol to be followed during the acceptance tests. (Author). 25 refs.

  6. Acceptance testing in digital systems of mammography. Protocols applicability; Pruebas de aceptacion en equipos digitales de mamografia. Aplicabilidad de protocolos

    Energy Technology Data Exchange (ETDEWEB)

    Bermudez, R.; Espana, M.L.; Garcia Castanon, P.; Gomez Barrado, A.; Rodriguez Martin, G.; Fernandez Bedoya, B.

    2011-07-01

    Acceptance testing of mammographic imaging systems technical is the first approach in order to guarantee that mammograms will be achieved with the minimum radiation dose compatible with an image quality suitable for diagnose purposes. The aim of this study is to assess the practical applicability of different protocols in acceptance test of digital mammographic systems. This study has been carried out on the results of the acceptance tests of five flat panel digital mammographic systems. Parameters established in the systems technical specifications and those evaluated in the consulted protocols were tested. Due to the fact that the legislation in our country does not demand to consider a specific protocol, the results obtained were also compared considering different existing protocols. Results show discrepancies between manufacturers limiting values and those established in the protocols. Some parameters, such as the automatic exposure control compensation and the detector noise, were found out to meet or not the limiting value, depending on the selected protocol. From our results we could suggest, that protocols from manufacturers should be adapted to acknowledged documents on acceptance testing in digital mammography. They buyer representative could even specify the protocol to be followed during the acceptance tests. (Author). 25 refs.

  7. Individualized music for dementia: Evolution and application of evidence-based protocol.

    Science.gov (United States)

    Gerdner, Linda A

    2012-04-22

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.

  8. Application of the cognitive therapy model to initial crisis assessment.

    Science.gov (United States)

    Calvert, Patricia; Palmer, Christine

    2003-03-01

    This article provides a background to the development of cognitive therapy and cognitive therapeutic skills with a specific focus on the treatment of a depressive episode. It discusses the utility of cognitive therapeutic strategies to the model of crisis theory and initial crisis assessment currently used by the Community Assessment & Treatment Team of Waitemata District Health Board on the North Shore of Auckland, New Zealand. A brief background to cognitive therapy is provided, followed by a comprehensive example of the use of the Socratic questioning method in guiding collaborative assessment and treatment of suicidality by nurses during the initial crisis assessment.

  9. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

    Directory of Open Access Journals (Sweden)

    Tiago D. P. Mendes

    2015-07-01

    Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.

  10. Temporal Precedence Checking for Switched Models and its Application to a Parallel Landing Protocol

    Science.gov (United States)

    Duggirala, Parasara Sridhar; Wang, Le; Mitra, Sayan; Viswanathan, Mahesh; Munoz, Cesar A.

    2014-01-01

    This paper presents an algorithm for checking temporal precedence properties of nonlinear switched systems. This class of properties subsume bounded safety and capture requirements about visiting a sequence of predicates within given time intervals. The algorithm handles nonlinear predicates that arise from dynamics-based predictions used in alerting protocols for state-of-the-art transportation systems. It is sound and complete for nonlinear switch systems that robustly satisfy the given property. The algorithm is implemented in the Compare Execute Check Engine (C2E2) using validated simulations. As a case study, a simplified model of an alerting system for closely spaced parallel runways is considered. The proposed approach is applied to this model to check safety properties of the alerting logic for different operating conditions such as initial velocities, bank angles, aircraft longitudinal separation, and runway separation.

  11. Study protocol for the FITR Heart Study: Feasibility, safety, adherence, and efficacy of high intensity interval training in a hospital-initiated rehabilitation program for coronary heart disease.

    Science.gov (United States)

    Taylor, Jenna; Keating, Shelley E; Leveritt, Michael D; Holland, David J; Gomersall, Sjaan R; Coombes, Jeff S

    2017-12-01

    For decades, moderate intensity continuous training (MICT) has been the cornerstone of exercise prescription for cardiac rehabilitation (CR). High intensity interval training (HIIT) is now recognized in CR exercise guidelines as an appropriate and efficient modality for improving cardiorespiratory fitness, a strong predictor of mortality. However, the clinical application of HIIT in a real world CR setting, in terms of feasibility, safety, and long-term adherence, needs further investigation to address ongoing reservations. Furthermore, studies using objective measures of exercise intensity (such as heart rate; HR) have produced variable outcomes. Therefore we propose investigating the use of subjective measures (such as rating of perceived exertion (RPE)) for prescribing exercise intensity. One hundred adults with coronary artery disease (CAD) attending a hospital-initiated CR program will be randomized to 1) HIIT: 4 × 4 min high intensity intervals at 15-18 RPE interspersed with 3-min active recovery periods or 2) MICT: usual care exercise including 40 min continuous exercise at a moderate intensity corresponding to 11-13 RPE. Primary outcome is change in exercise capacity (peak VO 2 ) following 4 weeks of exercise training. Secondary outcome measures are: feasibility, safety, exercise adherence, body composition, vascular function, inflammatory markers, intrahepatic lipid, energy intake, and dietary behavior over 12-months; and visceral adipose tissue (VAT) following 12 weeks of exercise training. This study aims to address the ongoing concerns regarding the practicality and safety of HIIT in CR programs. We anticipate study findings will lead to the development of a standardized protocol to facilitate CR programs to incorporate HIIT as a standard exercise option for appropriate patients.

  12. Stationary average consensus protocol for a class of heterogeneous high-order multi-agent systems with application for aircraft

    Science.gov (United States)

    Rezaei, Mohammad Hadi; Menhaj, Mohammad Bagher

    2018-01-01

    This paper investigates the stationary average consensus problem for a class of heterogeneous-order multi-agent systems. The goal is to bring the positions of agents to the average of their initial positions while letting the other states converge to zero. To this end, three different consensus protocols are proposed. First, based on the auxiliary variables information among the agents under switching directed networks and state-feedback control, a protocol is proposed whereby all the agents achieve stationary average consensus. In the second and third protocols, by resorting to only measurements of relative positions of neighbouring agents under fixed balanced directed networks, two control frameworks are presented with two strategies based on state-feedback and output-feedback control. Finally, simulation results are given to illustrate the effectiveness of the proposed protocols.

  13. A protocol for better design, application, and communication of population viability analyses.

    Science.gov (United States)

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  14. Application of an access technology delivery protocol to two children with cerebral palsy.

    Science.gov (United States)

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  15. Application of precursor methodology in initiating frequency estimates

    International Nuclear Information System (INIS)

    Kohut, P.; Fitzpatrick, R.G.

    1991-01-01

    The precursor methodology developed in recent years provides a consistent technique to identify important accident sequence precursors. It relies on operational events (extracting information from actual experience) and infers core damage scenarios based on expected safety system responses. The ranking or categorization of each precursor is determined by considering the full spectrum of potential core damage sequences. The methodology estimates the frequency of severe core damage based on the approach suggested by Apostolakis and Mosleh, which may lead to a potential overestimation of the severe-accident sequence frequency due to the inherent dependencies between the safety systems and the initiating events. The methodology is an encompassing attempt to incorporate most of the operating information available from nuclear power plants and is an attractive tool from the point of view of risk management. In this paper, a further extension of this methodology is discussed with regard to the treatment of initiating frequency of the accident sequences

  16. From initial application to routine operation: Reviewing the Applications for Power Uprates

    International Nuclear Information System (INIS)

    Garis, Ninos; Skaanberg, Lars

    2007-01-01

    Current plans for power uprates in Swedish nuclear power plants will lead to significant increases in seven units and a lesser increase in one unit. To date SKI has received six applications, and two more are due in 2007. A power uprate process is initiated by the application to the Government by a licensee for approval to increase the thermal output of a reactor unit. This request is addressed to the Government and is forwarded to SKI for a preliminary safety review. The result of the review is then provided by SKI as a basis for a governmental decision. Six applications have been taken through the first stage of the process; of these, three have received governmental approval and three are currently awaiting a decision. If the licensee's application is approved by the Government, deeper analyses and studies are required in order to modify the plant and update the safety analysis report and the associated technical specifications. SKI reviews this material on a continuous basis prior to test and routine operation at the increased power level. There are four stages that require attention and review by SKI; 1. Review of the application to the Government for approval to operate at increased power levels, and preparation of a suitable answer. 2. Review and approval of the preliminary safety analysis report (PSAR) 3. Review and approval of the application for testing at the higher power level 4. Review and approval of routine operation at the higher power level. A thorough description of the handling of a power uprate process can be found in the SKI PM (SKI-PM 04:11) that is available on the SKI website (in Swedish)

  17. Fast Oblivious AES A Dedicated application of the MiniMac protocol

    DEFF Research Database (Denmark)

    Zakarias, Rasmus Winther; Damgård, Ivan Bjerre

    2015-01-01

    We present an actively secure multi-partycomputation of the Advanced Encryption Standard (AES). To the best of our knowledge it is the fastest of its kind to date. We start from an efficient actively secure evaluation of general binary circuits that was implemented by the authors of [DLT14......]. They presented an optimized implementation of the so-called MiniMac protocol [DZ13] that runs in the pre-processing model, and applied this to a binary AES circuit. In this paper we de- scribe how to dedicate the pre-processing to the structure of AES, which improves significantly the throughput and latency...... of previous actively secure implementations. We get a latency of about 6 ms and amortised time about 0.4 ms per AES block, which seems completely adequate for practical applications such as verification of 1-time passwords....

  18. Predicting environmental aspects of CCSR leachates through the application of scientifically valid leaching protocols

    International Nuclear Information System (INIS)

    Hassett, D.J.

    1993-01-01

    The disposal of solid wastes from energy production, particularly solid wastes from coal conversion processes, requires a thorough understanding of the waste material as well as the disposal environment. Many coal conversion solid residues (CCSRs) have chemical, mineralogical, and physical properties advantageous for use as engineering construction materials and in other industrial applications. If disposal is to be the final disposition of CCSRs from any source, the very properties that can make ash useful also contribute to behavior that must be understood for scientifically logical and environmentally responsible disposal. This paper describes the application of scientifically valid leaching and characterization tests designed to predict field phenomena. The key to proper characterization of these unique materials is the recognition of and compensation for the hydration reactions that can occur during long-term leaching. Many of these reactions, such as the formation of the mineral ettringite, can have a profound effect on the concentration of potentially problematic trace elements such as boron, chromium, and selenium. The mobility of these elements, which may be concentrated in CCSRs due to the conversion process, must be properly evaluated for the formation of informed and scientifically sound decisions regarding safe disposal. Groundwater is an extremely important and relatively scarce resource. Contamination of this resource is a threat to life, which is highly dependent on it, so management of materials that can impact groundwater must be carefully planned and executed. The application of scientifically valid leaching protocols and complete testing are critical to proper waste management

  19. Artificial Intelligence Application in Power Generation Industry: Initial considerations

    Science.gov (United States)

    Ismail, Rahmat Izaizi B.; Ismail Alnaimi, Firas B.; AL-Qrimli, Haidar F.

    2016-03-01

    With increased competitiveness in power generation industries, more resources are directed in optimizing plant operation, including fault detection and diagnosis. One of the most powerful tools in faults detection and diagnosis is artificial intelligence (AI). Faults should be detected early so correct mitigation measures can be taken, whilst false alarms should be eschewed to avoid unnecessary interruption and downtime. For the last few decades there has been major interest towards intelligent condition monitoring system (ICMS) application in power plant especially with AI development particularly in artificial neural network (ANN). ANN is based on quite simple principles, but takes advantage of their mathematical nature, non-linear iteration to demonstrate powerful problem solving ability. With massive possibility and room for improvement in AI, the inspiration for researching them are apparent, and literally, hundreds of papers have been published, discussing the findings of hybrid AI for condition monitoring purposes. In this paper, the studies of ANN and genetic algorithm (GA) application will be presented.

  20. Dynamic whole body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-01-01

    Static whole body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single bed-coverage limiting the axial field-of-view to ~15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole body PET acquisition protocol of ~45min total length is presented, composed of (i) an initial 6-min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (6 passes x 7 bed positions, each scanned for 45sec). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares (OLS) Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of 10 different clinically

  1. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application.

    Science.gov (United States)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-10-21

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ~15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ~45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  2. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    International Nuclear Information System (INIS)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-01-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ∼15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ∼45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate K i and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different

  3. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-10-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  4. Bounding the per-protocol effect in randomized trials: An application to colorectal cancer screening

    NARCIS (Netherlands)

    S.A. Swanson (Sonja); Holme (Øyvind); M. Løberg (Magnus); M. Kalager (Mette); M. Bretthauer (Michael); G. Hoff (G.); E. Aas (Eline); M.A. Hernán (M.)

    2015-01-01

    textabstractBackground: The per-protocol effect is the effect that would have been observed in a randomized trial had everybody followed the protocol. Though obtaining a valid point estimate for the per-protocol effect requires assumptions that are unverifiable and often implausible, lower and upper

  5. Nuclear liability: Joint protocol relating to the application of the Vienna Convention and the Paris Convention, 1988

    International Nuclear Information System (INIS)

    1989-10-01

    The Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted by the Conference on the Relationship between the Paris Convention and the Vienna Convention, which met in Vienna, at the Headquarters of the International Atomic Energy Agency on 21 September 1988. The Joint Protocol establishes a link between the Paris Convention on Third Party Liability in the Field of Nuclear Energy of 1960 and the Vienna Convention on Civil Liability for Nuclear Damage of 1963. The Joint Protocol will extend to the States adhering to it the coverage of the two Conventions. It will also resolve potential conflicts of law, which could result from the simultaneous application of the two Conventions to the same nuclear accident. The Conference on the Relationship between the Paris Convention and the Vienna Convention was jointly organized by the International Atomic Energy Agency and the OECD Nuclear Energy Agency. This publication contains the text of the Final Act of the Conference in the six authentic languages, the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention, also in the six authentic languages and an explanatory note, prepared by the IAEA and NEA Secretariats, providing background information on the content of the Joint Protocol

  6. Initial Coupling of the RELAP-7 and PRONGHORN Applications

    Energy Technology Data Exchange (ETDEWEB)

    J. Ortensi; D. Andrs; A.A. Bingham; R.C. Martineau; J.W. Peterson

    2012-10-01

    Modern nuclear reactor safety codes require the ability to solve detailed coupled neutronic- thermal fluids problems. For larger cores, this implies fully coupled higher dimensionality spatial dynamics with appropriate feedback models that can provide enough resolution to accurately compute core heat generation and removal during steady and unsteady conditions. The reactor analysis code PRONGHORN is being coupled to RELAP-7 as a first step to extend RELAP’s current capabilities. This report details the mathematical models, the type of coupling, and the testing results from the integrated system. RELAP-7 is a MOOSE-based application that solves the continuity, momentum, and energy equations in 1-D for a compressible fluid. The pipe and joint capabilities enable it to model parts of the power conversion unit. The PRONGHORN application, also developed on the MOOSE infrastructure, solves the coupled equations that define the neutron diffusion, fluid flow, and heat transfer in a full core model. The two systems are loosely coupled to simplify the transition towards a more complex infrastructure. The integration is tested on a simplified version of the OECD/NEA MHTGR-350 Coupled Neutronics-Thermal Fluids benchmark model.

  7. Applicability of initial stress measurement methods to Horonobe Siliceous rocks and initial stress state around Horonobe Underground Research Laboratory

    International Nuclear Information System (INIS)

    Sanada, Hiroyuki; Niunoya, Sumio; Matsui, Hiroya; Fujii, Yoshiaki

    2009-01-01

    Understanding initial stress condition in deep underground is important for such construction as rock cavern for geological disposal of HLW and underground power plant. Neogene sedimentary rock is widely distributed in Japan. There are only a few studies of initial stress measurement in Neogene sedimentary rock mass in Japan due to difficulty of measurement. Evaluation of initial stress condition around Horonobe Underground Research Laboratory Project was carried out in order to understand initial stress condition and applicability of AE, DSCA and hydraulic fracturing (HF) methods to Neogene sedimentary rock. Initial stress values obtained from AE method is smaller than overburden pressure due to time dependency of Kaizer effect. It would be difficult to use AE method as initial stress measurement method for Horonobe Siliceous rocks. Principal stress values by DSCA are similar to those by HF tests. Directions of maximum horizontal principal stresses are approximately in E-W and corresponded to HF results. In HF, rod type and wire-line type systems were compared. Workability of rod type was much better than wire-line type. However, re-opening pressure were not able to be precisely measured in case of rod type system due to the large compliance of the packers and rods. Horizontal maximum and minimum principal stresses increase linearly in HF results. Deviatoric stress is acting at shallow depth. Initial stress condition approaches hydrostatic condition with depth. Direction of maximum horizontal principal stress was in E-W direction which was similar to tectonic movement around Horonobe URL by triangular surveying. (author)

  8. Performances of different protocols for exocellular polysaccharides extraction from milk acid gels: Application to yogurt.

    Science.gov (United States)

    Nguyen, An Thi-Binh; Nigen, Michaël; Jimenez, Luciana; Ait-Abderrahim, Hassina; Marchesseau, Sylvie; Picart-Palmade, Laetitia

    2018-01-15

    Dextran or xanthan were used as model exocellular polysaccharides (EPS) to compare the extraction efficiency of EPS from skim milk acid gels using three different protocols. Extraction yields, residual protein concentrations and the macromolecular properties of extracted EPS were determined. For both model EPS, the highest extraction yield (∼80%) was obtained when samples were heated in acidic conditions at the first step of extraction (Protocol 1). Protocols that contained steps of acid/ethanol precipitation without heating (Protocols 2 and 3) show lower extraction yields (∼55%) but allow a better preservation of the EPS macromolecular properties. Changing the pH of acid gels up to 7 before extraction (Protocol 3) improved the extraction yield of anionic EPS without effect on the macromolecular properties of EPS. Protocol 1 was then applied for the quantification of EPS produced during the yogurt fermentation, while Protocol 3 was dedicated to their macromolecular characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Application of Terahertz Radiation to Soil Measurements: Initial Results

    Science.gov (United States)

    Dworak, Volker; Augustin, Sven; Gebbers, Robin

    2011-01-01

    Developing soil sensors with the possibility of continuous online measurement is a major challenge in soil science. Terahertz (THz) electromagnetic radiation may provide the opportunity for the measurement of organic material density, water content and other soil parameters at different soil depths. Penetration depth and information content is important for a functional soil sensor. Therefore, we present initial research on the analysis of absorption coefficients of four different soil samples by means of THz transmission measurements. An optimized soil sample holder to determine absorption coefficients was used. This setup improves data acquisition because interface reflections can be neglected. Frequencies of 340 GHz to 360 GHz and 1.627 THz to 2.523 THz provided information about an existing frequency dependency. The results demonstrate the potential of this THz approach for both soil analysis and imaging of buried objects. Therefore, the THz approach allows different soil samples to be distinguished according to their different absorption properties so that relations among soil parameters may be established in future. PMID:22163737

  10. Initial research on recycled tyre bales for road infrastructure applications

    Science.gov (United States)

    Duda, Aleksander; Sobala, Dariusz

    2017-12-01

    The paper reviews selected surveys carried out within the R&D project, co-financed with the European Regional Development Fund, called "ReUse - Innovative Recycling Materials, Enhancing the Sustainability of Bridge Facilities" (Innotech No. K3 / IN3 / 38/228116 / NCBiR / 15). The aim of the project and conducted research is to develop and implement innovative, cheap and environmentally-friendly recycled construction material in the form of tyre bales made from compressed used car tyres. This material is likely to be applied in civil engineering, especially in transport infrastructure, geotechnical and hydraulic engineering. New material is cheap and has unique properties such as low weight, high water permeability, high vibration and noise-damping capacity, low pressure coefficient values and other parameters that technically and economically allow it to replace natural aggregates. The extensive practical application of new material will facilitate the replacement of waste management methods with the environmentally friendly ones.

  11. 7 CFR 4290.360 - Initial review of Applicant's management team's qualifications.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Initial review of Applicant's management team's...'s management team's qualifications. The Secretary will review the information submitted by the Applicant concerning the qualifications of the Applicant's management team to determine in his or her sole...

  12. CERN and the 10,000th application of the WorldFIP protocol

    CERN Multimedia

    2001-01-01

    On 24 April, CERN received an award for the 10,000th application of the WorldFIP industrial communication network protocol. The award was presented to Juan Antonio Rubio, Head of CERN's ETT Division, by Marc Desjardins, President of the WorldFIP association, which groups together 430 industrial partners with the aim of promoting the WorldFIP concept. Marc Desjardins, President of the WorldFIP association, presenting the award for the 10,000th application to CERN ETT Division Leader Juan Antonio Rubio. From left to right: Guy Baribaud (CERN), Ercole Gallacio (WF), Noël Fayard (WF), Gérard Demars (WF), Dario Fantoni (WF), Marc Desjardins (WF), Raymond Brun (CERN), Jean-Pierre Hauet (WF), Juan Antonio Rubio (CERN), Bernard Jouga (WF), Raymond Rausch (CERN), Jean-Pierre Froidevaux (WF), Marilena Streit-Bianchi (CERN), Michel Rabany (CERN), Patrick Chatelet (WF), Nicolas Cravoisy (WF), Jean Bergeal (WF). Communication networks, also known as fieldbuses, provide for digital comunication betwe...

  13. Application of NDE methods to green ceramics: initial results

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Karplus, H.B.; Poeppel, R.B.; Ellingson, W.A.; Berger, H.; Robbins, C.; Fuller, E.

    1983-01-01

    The effectiveness of microradiography, ultrasonic methods, unclear magnetic resonance, and neutron radiography was assessed for the nondestructive evaluation of green (unfired) ceramics. The application of microradiography to ceramics is reviewed, and preliminary experiments with a commercial microradiography unit are described. Conventional ultrasonic techniques are difficult to apply to flaw detection green ceramics because of the high attenuation, fragility, and couplant-absorbing properties of these materials. However, velocity, attenuation, and spectral data were obtained with pressure-coupled transducers and provided useful informaion related to density variations and the presence of agglomerates. Nuclear magnetic resonance (NMR) imaging techniques and neutron radiography were considered for detection of anomalies in the distribution of porosity. With NMR, areas of high porosity might be detected after the samples are doped with water. In the case of neutron radiography, although imaging the binder distribution throughout the sample may not be feasible because of the low overall concentration of binder, regions of high binder concentration (thus high porosity) should be detectable

  14. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    DEFF Research Database (Denmark)

    Burgy, Laurent; Reveillere, Laurent; Lawall, Julia Laetitia

    2007-01-01

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain...

  15. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  16. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...... parameters the ETX parameter is used in relation to the length of the shortest path. Proposed methods are independent of the media type and can be implemented either in wireless or PLC....

  17. Nonlinear Variation of Parameters Formula for Impulsive Differential Equations with Initial Time Difference and Application

    Directory of Open Access Journals (Sweden)

    Peiguang Wang

    2014-01-01

    Full Text Available This paper establishes variation of parameters formula for impulsive differential equations with initial time difference. As an application, one of the results is used to investigate stability properties of solutions.

  18. Initiating change locally in bullying and aggression through the school environment (INCLUSIVE) trial: update to cluster randomised controlled trial protocol.

    Science.gov (United States)

    Bonell, Chris; Mathiot, Anne; Allen, Elizabeth; Bevilacqua, Leonardo; Christie, Deborah; Elbourne, Diana; Fletcher, Adam; Grieve, Richard; Legood, Rosa; Scott, Stephen; Warren, Emily; Wiggins, Meg; Viner, Russell M

    2017-05-25

    Systematic reviews suggest that multi-component interventions are effective in reducing bullying victimisation and perpetration. We are undertaking a phase III randomised trial of the INCLUSIVE multi-component intervention. This trial aims to assess the effectiveness and cost-effectiveness of the INCLUSIVE intervention in reducing aggression and bullying victimisation in English secondary schools. This paper updates the original trial protocol published in 2014 (Trials 15:381, 2014) and presents the changes in the process evaluation protocol and the secondary outcome data collection. The methods are summarised as follows. cluster randomised trial. 40 state secondary schools. Outcomes assessed among the cohort of students at the end of year 7 (n = 6667) at baseline. INCLUSIVE is a multi-component school intervention including a social and emotional learning curriculum, changes to school environment (an action group comprising staff and students reviews local data on needs to review rules and policies and determine other local actions) and staff training in restorative practice. The intervention will be delivered by schools supported in the first two years by educational facilitators independent of the research team, with a third intervention year involving no external facilitation but all other elements. Comparator: normal practice. Primary: Two primary outcomes at student level assessed at baseline and at 36 months: 1. Aggressive behaviours in school: Edinburgh Study of Youth Transitions and Crime school misbehaviour subscale (ESYTC) 2. Bullying and victimisation: Gatehouse Bullying Scale (GBS) Secondary outcomes assessed at baseline, 24 and 36 months will include measures relating to the economic evaluation, psychosocial outcomes in students and staff and school-level truancy and exclusion rates. 20 schools per arm will provide 90% power to identify an effect size of 0.25 SD with a 5% significance level. Randomisation: eligible consenting schools were

  19. Update on the Vienna Protocol and CSC: issues of implementation and application in national legislation

    International Nuclear Information System (INIS)

    Horbach, N. l. J. T.

    2000-01-01

    This paper aims to reflect the recent developments in respect of the 1997 Vienna Protocol (VP) and the 1997 Convention on Supplementary Compensation (CSC), i.e. the changes in signatories and ratificiations of both instruments, and the impacts these will have upon the geographical scope of nuclear liability laws of those countries covered or linked to each other within the international nuclear liability regime. To the extent that certain countries have ratified either the VP or the CSC, it is important to analyse their existing nuclear liability legislation and the manner in which it already implements or aims to implement certain crucial new elements introduced by both instruments, such as, the liability limitation in time and amount, the extension of the geographical scope to damage wherever suffered as well as in the EEZ, the extension of the definition of nuclear damage and preventive measures, and finally, the deletion of some of the exoneration of the operatos's liability. In this context, especially the concept of nuclear environmental damage and the extent to which it is currently covered by existing nuclear liability legislation or, possibly, environmental law, will be given some special attention. Finally, the paper will focus on various aspects of the implementation and application of these new elements of both 1997 instruments within some CEEC's nuclear liability regimes as an example to identify those issues that will produce special problems (e.g., administrative, legal, insurance, or political) or necessitate additional legislative efforts in respect of their implementation in national laws. (author)

  20. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  1. An Experimental Protocol for Assessing the Performance of New Ultrasound Probes Based on CMUT Technology in Application to Brain Imaging.

    Science.gov (United States)

    Matrone, Giulia; Ramalli, Alessandro; Savoia, Alessandro Stuart; Quaglia, Fabio; Castellazzi, Gloria; Morbini, Patrizia; Piastra, Marco

    2017-09-24

    The possibility to perform an early and repeatable assessment of imaging performance is fundamental in the design and development process of new ultrasound (US) probes. Particularly, a more realistic analysis with application-specific imaging targets can be extremely valuable to assess the expected performance of US probes in their potential clinical field of application. The experimental protocol presented in this work was purposely designed to provide an application-specific assessment procedure for newly-developed US probe prototypes based on Capacitive Micromachined Ultrasonic Transducer (CMUT) technology in relation to brain imaging. The protocol combines the use of a bovine brain fixed in formalin as the imaging target, which ensures both realism and repeatability of the described procedures, and of neuronavigation techniques borrowed from neurosurgery. The US probe is in fact connected to a motion tracking system which acquires position data and enables the superposition of US images to reference Magnetic Resonance (MR) images of the brain. This provides a means for human experts to perform a visual qualitative assessment of the US probe imaging performance and to compare acquisitions made with different probes. Moreover, the protocol relies on the use of a complete and open research and development system for US image acquisition, i.e. the Ultrasound Advanced Open Platform (ULA-OP) scanner. The manuscript describes in detail the instruments and procedures involved in the protocol, in particular for the calibration, image acquisition and registration of US and MR images. The obtained results prove the effectiveness of the overall protocol presented, which is entirely open (within the limits of the instrumentation involved), repeatable, and covers the entire set of acquisition and processing activities for US images.

  2. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  3. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    Science.gov (United States)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  4. Motor Phenotype in Neurodegenerative Disorders: Gait and Balance Platform Study Design Protocol for the Ontario Neurodegenerative Research Initiative (ONDRI).

    Science.gov (United States)

    Montero-Odasso, Manuel; Pieruccini-Faria, Frederico; Bartha, Robert; Black, Sandra E; Finger, Elizabeth; Freedman, Morris; Greenberg, Barry; Grimes, David A; Hegele, Robert A; Hudson, Christopher; Kleinstiver, Peter W; Lang, Anthony E; Masellis, Mario; McLaughlin, Paula M; Munoz, Douglas P; Strother, Stephen; Swartz, Richard H; Symons, Sean; Tartaglia, Maria Carmela; Zinman, Lorne; Strong, Michael J; McIlroy, William

    2017-01-01

    The association of cognitive and motor impairments in Alzheimer's disease and other neurodegenerative diseases is thought to be related to damage in the common brain networks shared by cognitive and cortical motor control processes. These common brain networks play a pivotal role in selecting movements and postural synergies that meet an individual's needs. Pathology in this "highest level" of motor control produces abnormalities of gait and posture referred to as highest-level gait disorders. Impairments in cognition and mobility, including falls, are present in almost all neurodegenerative diseases, suggesting common mechanisms that still need to be unraveled. To identify motor-cognitive profiles across neurodegenerative diseases in a large cohort of patients. Cohort study that includes up to 500 participants, followed every year for three years, across five neurodegenerative disease groups: Alzheimer's disease/mild cognitive impairment, frontotemporal degeneration, vascular cognitive impairment, amyotrophic lateral sclerosis, and Parkinson's disease. Gait and balance will be assessed using accelerometers and electronic walkways, evaluated at different levels of cognitive and sensory complexity, using the dual-task paradigm. Comparison of cognitive and motor performances across neurodegenerative groups will allow the identification of motor-cognitive phenotypes through the standardized evaluation of gait and balance characteristics. As part of the Ontario Neurodegenerative Research Initiative (ONDRI), the gait and balance platform aims to identify motor-cognitive profiles across neurodegenerative diseases. Gait assessment, particularly while dual-tasking, will help dissect the cognitive and motor contribution in mobility and cognitive decline, progression to dementia syndromes, and future adverse outcomes including falls and mortality.

  5. Application of a topical vapocoolant spray decreases pain at the site of initial intradermal anaesthetic injection during ultrasound-guided breast needle biopsy

    International Nuclear Information System (INIS)

    Collado-Mesa, F.; Net, J.M.; Arheart, K.; Klevos, G.A.; Yepes, M.M.

    2015-01-01

    Aim: To assess whether the application of a topical vapocoolant spray immediately prior to initial intradermal anaesthetic injection during ultrasound-guided breast biopsy decreases pain at the site of the initial injection. Materials and methods: In this institutional review board-approved, Health Insurance Portability and Accountability Act (HIPAA)-compliant study, 50 women aged 49.1 ± 1.6 years (mean ± standard error) were recruited and provided written informed consent. Participants served as their own controls and were blinded as to whether a topical vapocoolant spray or a placebo was used immediately prior to the initial local anaesthetic injection at two separate biopsy sites. With the exception of the application of vapocoolant or placebo, the entire ultrasound-guided procedure was performed according to a routine protocol. Participants recorded pain at initial injection site on a visual analogue scale. General linear mixed models for repeated measures analysis of variance and a 0.05 significance level were used. Results: Application of topical vapocoolant spray was shown to significantly decrease pain at the site of initial intradermal anaesthetic injection as compared to placebo (p<0.001). Treatment effect was independent of age of the subject, race/ethnicity, operator, type of biopsy device, and histopathology result. No complications from vapocoolant spray use were reported. Conclusion: Application of a topical vapocoolant spray immediately prior to initial intradermal anaesthetic injection during ultrasound-guided breast biopsy significantly decreases pain at the site of the initial injection and could contribute to improve the patient's overall procedural experience. -- Highlights: •Topical vapocoolant spray decreased pain at site of initial anesthetic injection (

  6. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  7. Developing community-driven quality improvement initiatives to enhance chronic disease care in Indigenous communities in Canada: the FORGE AHEAD program protocol.

    Science.gov (United States)

    Naqshbandi Hayward, Mariam; Paquette-Warren, Jann; Harris, Stewart B

    2016-07-26

    Given the dramatic rise and impact of chronic diseases and gaps in care in Indigenous peoples in Canada, a shift from the dominant episodic and responsive healthcare model most common in First Nations communities to one that places emphasis on proactive prevention and chronic disease management is urgently needed. The Transformation of Indigenous Primary Healthcare Delivery (FORGE AHEAD) Program partners with 11 First Nations communities across six provinces in Canada to develop and evaluate community-driven quality improvement (QI) initiatives to enhance chronic disease care. FORGE AHEAD is a 5-year research program (2013-2017) that utilizes a pre-post mixed-methods observational design rooted in participatory research principles to work with communities in developing culturally relevant innovations and improved access to available services. This intensive program incorporates a series of 10 inter-related and progressive program activities designed to foster community-driven initiatives with type 2 diabetes mellitus as the action disease. Preparatory activities include a national community profile survey, best practice and policy literature review, and readiness tool development. Community-level intervention activities include community and clinical readiness consultations, development of a diabetes registry and surveillance system, and QI activities. With a focus on capacity building, all community-level activities are driven by trained community members who champion QI initiatives in their community. Program wrap-up activities include readiness tool validation, cost-analysis and process evaluation. In collaboration with Health Canada and the Aboriginal Diabetes Initiative, scale-up toolkits will be developed in order to build on lessons-learned, tools and methods, and to fuel sustainability and spread of successful innovations. The outcomes of this research program, its related cost and the subsequent policy recommendations, will have the potential to

  8. The Quality Initiative in Rectal Cancer (QIRC trial: study protocol of a cluster randomized controlled trial in surgery

    Directory of Open Access Journals (Sweden)

    Thabane Lehana

    2008-02-01

    Full Text Available Abstract Background Two unfortunate outcomes for patients treated surgically for rectal cancer are placement of a permanent colostomy and local tumor recurrence. Total mesorectal excision is a new technique for rectal cancer surgery that can lead to improved patient outcomes. We describe a cluster randomized controlled trial that is testing if the above patient outcomes can be improved through a knowledge translation strategy called the Quality Initiative in Rectal Cancer (QIRC strategy. The strategy is designed to optimize the use of total mesorectal excision techniques. Methods and Design Hospitals were randomized to the QIRC strategy (experimental group versus normal practice environment (control group. Participating hospitals, and the respective surgeon group operating in them, are from Ontario, Canada and have an annual procedure volume for major rectal cancer resections of 15 or greater. Patients were eligible if they underwent major rectal surgery for a diagnosis of primary rectal cancer. The surgeon-directed QIRC interventions included a workshop, use of opinion leaders, operative demonstrations, a post-operative questionnaire, and, audit and feedback. For an operative demonstration participating surgeons invited a study team surgeon to assist them with a case of rectal cancer surgery. The intent was to demonstrate total mesorectal excision techniques. Control arm surgeons received no intervention. Sample size calculations were two-sided, considered the clustering of data at the hospital level, and were driven by requirements for the outcome local recurrence. To detect an improvement in local recurrence from 20% to 8% with confidence we required 16 hospitals and 672 patients – 8 hospitals and 336 patients in each arm. Outcomes data are collected via chart review for at least 30 months after surgery. Analyses will use an intention-to-treat principle and will consider the clustering of data. Data collection will be complete by the end of

  9. Joint Protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 30 September 2002. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    2002-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 30 September 2002. The Joint Protocol entered into force on 27 April 1992

  10. Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 11 June 1998. It was signed in Vienna on 12 June 1998

  11. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Signature, ratification, acceptance, approval or accession. Status as of 31 December 1996

    International Nuclear Information System (INIS)

    1997-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 31 December 1996. The Joint Protocol entered into force on 27 April 1992

  12. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 12 September 2000. Signature, ratification, acceptance, approval or accession

    International Nuclear Information System (INIS)

    2000-01-01

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 12 September 2000. The Joint Protocol entered into force on 27 April 1992

  13. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Signature, ratification, acceptance, approval or accession. Status as of 31 December 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-28

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 31 December 1996. The Joint Protocol entered into force on 27 April 1992.

  14. Application of neutron transmutation doping method to initially p-type silicon material.

    Science.gov (United States)

    Kim, Myong-Seop; Kang, Ki-Doo; Park, Sang-Jun

    2009-01-01

    The neutron transmutation doping (NTD) method was applied to the initially p-type silicon in order to extend the NTD applications at HANARO. The relationship between the irradiation neutron fluence and the final resistivity of the initially p-type silicon material was investigated. The proportional constant between the neutron fluence and the resistivity was determined to be 2.3473x10(19)nOmegacm(-1). The deviation of the final resistivity from the target for almost all the irradiation results of the initially p-type silicon ingots was at a range from -5% to 2%. In addition, the burn-up effect of the boron impurities, the residual (32)P activity and the effect of the compensation characteristics for the initially p-type silicon were studied. Conclusively, the practical methodology to perform the neutron transmutation doping of the initially p-type silicon ingot was established.

  15. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    Science.gov (United States)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  16. Protocol Additional to the Agreement between the People's Republic of China and the International Atomic Energy Agency for the Application of Safeguards in China

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of China and the International Atomic Energy Agency for the application of safeguards in China is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 31 December 1998. Pursuant to Article 10 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from China written notification that China's statutory and constitutional requirements for entry into force have been met, i.e. on 28 March 2002

  17. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  18. On the Performance of the Current MANET Routing Protocols for VoIP, HTTP, and FTP Applications

    Directory of Open Access Journals (Sweden)

    Waheb A. Jabbar

    2014-01-01

    Full Text Available The recent advances of ensemble mobile environment of smart devices with embedded sensors have enabled the MANET to play a key role in the smart cities as well as WSN and WMN. However, these smart devices are still limited in terms of energy, processor, and memory. Moreover, the efficient routing for reliable network connectivity at anytime, anywhere, and about everything is still a challenge in multihop wireless networks. This paper evaluates the QoS and energy efficiency of three active routing protocols: (i OLSRv2, a successor to OLSR, (ii DYMO, a successor to both DSR and AODV, and (iii MP-OLSR multipath extension to OLSRv2. In contrast to the related previous works which focused only on CBR traffic without considering the influence of specific traffic types on the performance of routing protocols, this work focused on this area from a different perspective. It evaluates the performance of three internet-based traffic types that can be used in the smart city applications: VoIP, HTTP, and FTP using different simulation models. The impact of the network density, load traffic, and nodes mobility on the considered protocols was evaluated by considering particular performance metrics for each traffic application. Based on the results, the study concludes by presenting useful recommendations for future work.

  19. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  20. Industrial output restriction and the Kyoto protocol. An input-output approach with application to Canada

    International Nuclear Information System (INIS)

    Lixon, Benoit; Thomassin, Paul J.; Hamaide, Bertrand

    2008-01-01

    The objective of this paper is to assess the economic impacts of reducing greenhouse gas emissions by decreasing industrial output in Canada to a level that will meet the target set out in the Kyoto Protocol. The study uses an ecological-economic Input-Output model combining economic components valued in monetary terms with ecologic components - GHG emissions - expressed in physical terms. Economic and greenhouse gas emissions data for Canada are computed in the same sectoral disaggregation. Three policy scenarios are considered: the first one uses the direct emission coefficients to allocate the reduction in industrial output, while the other two use the direct plus indirect emission coefficients. In the first two scenarios, the reduction in industrial sector output is allocated uniformly across sectors while it is allocated to the 12 largest emitting industries in the last one. The estimated impacts indicate that the results vary with the different allocation methods. The third policy scenario, allocation to the 12 largest emitting sectors, is the most cost effective of the three as the impacts of the Kyoto Protocol reduces Gross Domestic Product by 3.1% compared to 24% and 8.1% in the first two scenarios. Computed economic costs should be considered as upper-bounds because the model assumes immediate adjustment to the Kyoto Protocol and because flexibility mechanisms are not incorporated. The resulting upper-bound impact of the third scenario may seem to contradict those who claim that the Kyoto Protocol would place an unbearable burden on the Canadian economy. (author)

  1. DEVELOPMENT AND APPLICATION OF PROTOCOLS FOR EVALUATION OF OIL SPILL BIOREMEDIATION (RESEARCH BRIEF)

    Science.gov (United States)

    Protocols were developed and evaluated to assess the efficacy and environmental safety of commercial oil spill bioremediation agents (CBAs). Test systems that simulate oil slicks on open water or oiled sandy beaches were used to test the effectiveness of CBAs. Gravimetric and gas...

  2. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID−TIA): study protocol for a pilot randomised controlled trial

    Science.gov (United States)

    2013-01-01

    Background People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist – that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? Methods/Design This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final

  3. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID-TIA): study protocol for a pilot randomised controlled trial.

    Science.gov (United States)

    Edwards, Duncan; Fletcher, Kate; Deller, Rachel; McManus, Richard; Lasserson, Daniel; Giles, Matthew; Sims, Don; Norrie, John; McGuire, Graham; Cohn, Simon; Whittle, Fiona; Hobbs, Vikki; Weir, Christopher; Mant, Jonathan

    2013-07-02

    People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist--that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final TIA clinic diagnosis as the

  4. Plasma Discharge Initiation of Explosives in Rock Blasting Application: A Case Study

    International Nuclear Information System (INIS)

    Chae, Jae-Ou; Jeong, Young-Jun; Shmelev, V M; Denicaev, A A; Poutchkov, V M; Ravi, V

    2006-01-01

    A plasma discharge initiation system for the explosive volumetric combustion charge was designed, investigated and developed for practical application. Laboratory scale experiments were carried out before conducting the large scale field tests. The resultant explosions gave rise to less noise, insignificant seismic vibrations and good specific explosive consumption for rock blasting. Importantly, the technique was found to be safe and environmentally friendly

  5. Development of a new Emergency Medicine Spinal Immobilization Protocol for trauma patients and a test of applicability by German emergency care providers.

    Science.gov (United States)

    Kreinest, Michael; Gliwitzky, Bernhard; Schüler, Svenja; Grützner, Paul A; Münzberg, Matthias

    2016-05-14

    In order to match the challenges of quickly recognizing and treating any life-threatening injuries, the ABCDE principles were established for the assessment and treatment of trauma patients. The high priority of spine protection is emphasized by the fact that immobilization of the cervical spine is performed at the very first step in the ABCDE principles. Immobilization is typically performed to prevent or minimize secondary damage to the spinal cord if instability of the spinal column is suspected. Due to increasing reports about disadvantages of spinal immobilization, the indications for performing spinal immobilization must be refined. The aim of this study was (i) to develop a protocol that supports decision-making for spinal immobilization in adult trauma patients and (ii) to carry out the first applicability test by emergency medical personnel. A structured literature search considering the literature from 1980 to 2014 was performed. Based on this literature and on the current guidelines, a new protocol that supports on scene decision-making for spinal immobilization has been developed. Parameters found in the literature concerning mechanisms and factors increasing the likelihood of spinal injury have been included in the new protocol. In order to test the applicability of the new protocol two surveys were performed on German emergency care providers by means of a questionnaire focused on correct decision-making if applying the protocol. Based on the current literature and guidelines, the Emergency Medicine Spinal Immobilization Protocol (E.M.S. IMMO Protocol) for adult trauma patients was developed. Following a fist applicability test involving 21 participants, the first version of the E.M.S. IMMO Protocol has to be graphically re-organized. A second applicability test comprised 50 participants with the current version of the protocol confirmed good applicability. Questions regarding immobilization of trauma patients could be answered properly using the E

  6. Lower limb ice application alters ground reaction force during gait initiation

    Directory of Open Access Journals (Sweden)

    Thiago B. Muniz

    2015-04-01

    Full Text Available BACKGROUND: Cryotherapy is a widely used technique in physical therapy clinics and sports. However, the effects of cryotherapy on dynamic neuromuscular control are incompletely explained. OBJECTIVES: To evaluate the effects of cryotherapy applied to the calf, ankle and sole of the foot in healthy young adults on ground reaction forces during gait initiation. METHOD: This study evaluated the gait initiation forces, maximum propulsion, braking forces and impulses of 21 women volunteers through a force platform, which provided maximum and minimum ground reaction force values. To assess the effects of cooling, the task - gait initiation - was performed before ice application, immediately after and 30 minutes after removal of the ice pack. Ice was randomly applied on separate days to the calf, ankle and sole of the foot of the participants. RESULTS: It was demonstrated that ice application for 30 minutes to the sole of the foot and calf resulted in significant changes in the vertical force variables, which returned to their pre-application values 30 minutes after the removal of the ice pack. Ice application to the ankle only reduced propulsion impulse. CONCLUSIONS: These results suggest that although caution is necessary when performing activities that require good gait control, the application of ice to the ankle, sole of the foot or calf in 30-minute intervals may be safe even preceding such activities.

  7. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  8. Application of Modbus communication protocol and float-point display in MCS51 system

    International Nuclear Information System (INIS)

    Kong Xiangcheng; Liu Shaozhen

    2010-01-01

    As its widely opening and easy performance, Modbus communication protocol has a great advantage in field bus using. Details are given on a method to implement Modbus communication protocol based on MCS51 system, and the advantage of uVision integrated environment. The design realizes Modbus RTU mode communication, meanwhile the problem of synchronization in communication is solved. And float-point operation and display are achieved by format print. All of this are carried out under uVision integrated environment. The result approves that the response ratio of Modbus communication is 100%. The design shows the advantage of uVision integrated environment and MCS51 system. And also gives solution to the occasion where communication interface and low cost are required. (authors)

  9. Large-scale hydrological simulations using the soil water assessment tool, protocol development, and application in the danube basin.

    Science.gov (United States)

    Pagliero, Liliana; Bouraoui, Fayçal; Willems, Patrick; Diels, Jan

    2014-01-01

    The Water Framework Directive of the European Union requires member states to achieve good ecological status of all water bodies. A harmonized pan-European assessment of water resources availability and quality, as affected by various management options, is necessary for a successful implementation of European environmental legislation. In this context, we developed a methodology to predict surface water flow at the pan-European scale using available datasets. Among the hydrological models available, the Soil Water Assessment Tool was selected because its characteristics make it suitable for large-scale applications with limited data requirements. This paper presents the results for the Danube pilot basin. The Danube Basin is one of the largest European watersheds, covering approximately 803,000 km and portions of 14 countries. The modeling data used included land use and management information, a detailed soil parameters map, and high-resolution climate data. The Danube Basin was divided into 4663 subwatersheds of an average size of 179 km. A modeling protocol is proposed to cope with the problems of hydrological regionalization from gauged to ungauged watersheds and overparameterization and identifiability, which are usually present during calibration. The protocol involves a cluster analysis for the determination of hydrological regions and multiobjective calibration using a combination of manual and automated calibration. The proposed protocol was successfully implemented, with the modeled discharges capturing well the overall hydrological behavior of the basin. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  10. OTN Transport of Baseband Radio Serial Protocols in C-RAN Architecture for Mobile Network Applications

    OpenAIRE

    Checko, Aleksandra; Kardaras, Georgios; Lanzani, Christian Fabio Alessandro; Temple, Dan; Mathiasen, Carsten; Pedersen, Lars A.; Klaps, Bert

    2014-01-01

    This white paper presents a proof of concept implementation of digital baseband radio data transport over Optical Transport Network (OTN) compliant to 3GPP Long Term Evolution – Advanced (LTE-A) standard enabling Cloud Radio Access Network (C-RAN) architecture. The transport between the baseband module and a remote radio module is compliant to Common Public Radio Interface (CPRI) and to the OBSAI reference point 3 - 01 (RP3-01) interface protocols, respectively. The purpose is to demonstrate ...

  11. Application of biodegradation screening protocol to contaminated soils from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Smith, J.R.; Nakles, D.V.; Cushey, M.A.; Morgan, D.J.; Linz, D.G.

    1990-01-01

    Bioremediation (i.e., land treatment) has been demonstrated to be a viable option for treating a variety of soils contamianted with organics. Conventional treatability studies utilize soil microcosm experiments to evaluate the potential for bioremediation of specific contaminated soils. Unfortunately, soil microcosms take from 4- to 6-months to complete and do not fully exploit the current understanding of the bioremediation process. This paper describes a treatability protocol that investigates underlying mechanisms and can be completed in 2- to 3-months. It is believed that soil bioremediation is governed by the sequential processes of contanate desorption from the soil into the aqueous phase and subsequent oxidation by microorganisms. The relative importance of each process depends upon the contaminant and soil. Accordingly, the treatability protocol has three steps. In the first step, tests are performed to determine soil characteristics. In the second step, tests are performed to characterize the desorption of contaminants from the soil. In the third step, the potential for biological oxidaiton is evaluated with a soil-water slurry reactor that maximizes desorption and provides an optimum environment for microbial growth. This paper provides a thorough discussion of the laboratory protocol including the primary theoretical tenets which serve as its basis. Preliminary procedures and results are presented for soils contaminated with manufactured gas plant (MGP) wastes. Particular attention is focused on biodegradation of polynuclear aromatic hydrocarbons (PAHs)

  12. Therapeutic efficacy and toxicity of bolus application of chemotherapy protocol in the treatment of metastatic colorectal cancer.

    Science.gov (United States)

    Šišić, Ibrahim; Pojskić, Belma; Mekić Abazović, Alma; Kovčin, Vladimir

    2015-08-01

    To compare efficacy and toxicity of bolus application of chemotherapy protocol, oxaliplatin, fluorouracil (bolus), leucovorin (folfox) between two groups of patients in the therapy of metastatic colorectal carcinoma (mCRC). A total of 63 patients were treated for mCRC in the period January 2009 - January 2010 at the Department of Oncology of the Cantonal Hospital Zenica, Bosnia and Herzegovina (first group, 30 patients) and at the Department of Oncology of the Clinical Hospital Centre Bežanijska kosa in Belgrade, Serbia, in the period January 2005 - January 2006 (second group, 33 patients). The patients were treated according the same protocol, i.v. bolus infusion, but in different day intervals (D), 1, 8, 15/28 days or D1-D5/28 days, respectively. In all patients the following factors were analyzed: tumor response, overall survival (OS), progression free survival, hematological and non-hematological toxicity . Colon was the primary localization in almost two thirds of patients. There was no statistically significant difference between the groups according to the age, hematological and non-hematological toxicity, as well as in achieved OS. Progression free survival expressed in months was in average 5 months though with a large range between minimal and maximal survival time. Both groups have shown equivalent efficacy to applied chemotherapy protocols. Overall survival in the two groups matched data from the literature. Further research should confirm success of the combination of chemotherapy protocols and their combination with the biological therapy. Copyright© by the Medical Assotiation of Zenica-Doboj Canton.

  13. Therapeutic efficacy and toxicity of bolus application of chemotherapy protocol in the treatment of metastatic colorectal cancer

    Directory of Open Access Journals (Sweden)

    Ibrahim Šišić

    2015-08-01

    Full Text Available Aim To compare efficacy and toxicity of bolus application of chemotherapy protocol, oxaliplatin, fluorouracil (bolus, leucovorin (folfox between two groups of patients in the therapy of metastatic colorectal carcinoma (mCRC. Methods A total of 63 patients were treated for mCRC in the period January 2009 – January 2010 at the Department of Oncology of the Cantonal Hospital Zenica, Bosnia and Herzegovina (first group, 30 patients and at the Department of Oncology of the Clinical Hospital Centre Bežanijska kosa in Belgrade, Serbia, in the period January 2005 – January 2006 (second group, 33 patients. The patients were treated according the same protocol, i.v. bolus infusion, but in different day intervals (D, 1, 8, 15/28 days or D1-D5/28 days, respectively. In all patients the following factors were analyzed: tumor response, overall survival (OS, progression free survival, hematological and non-hematological toxicity. Results Colon was the primary localization in almost two thirds of patients. There was no statistically significant difference between the groups according to the age, hematological and non-hematological toxicity, as well as in achieved OS. Progression free survival expressed in months was in average 5 months though with a large range between minimal and maximal survival time. Conclusion Both groups have shown equivalent efficacy to applied chemotherapy protocols. Overall survival in the two groups matched data from the literature. Further research should confirm success of the combination of chemotherapy protocols and their combination with the biological therapy.

  14. The application of PS printing plate with Biimidazole photosensitive initiating systems

    International Nuclear Information System (INIS)

    Li Lidong; Xu Jinqi; Gao Fang; Yang Yongyuan

    1999-01-01

    The ultraviolet photosensitive initiating system is composed of 4,4'-bis(N,N'-dimethyl-amino)benzophenone(MK), 2-chlorohexaarylbiimidazole(o-C1-HABI) and a hydrogen donor co-initiator n-dodecyl mercaptan(SH). Under the irradiation by high pressure mercury lamp, the relationship between the photo-polymerization rate of MMA and the concentration of each component of the system, including MK, o-C1-HABI and SH, was studied. The excellent results have been obtained through studying the system's application on PS lithographic printing plate

  15. Using the intervention mapping protocol to reduce European preschoolers’ sedentary behavior, an application to the ToyBox-Study

    Science.gov (United States)

    2014-01-01

    Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with

  16. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study.

    Science.gov (United States)

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-02-19

    High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The

  17. Developing experimental protocols for chronic irradiation studies: the application of a good practice guide framework

    International Nuclear Information System (INIS)

    Wood, M.D.; Knowles, J.D.; Whittaker, J.H.; Copplestone, D.; Malcolm, H.M.; Bielby, S.; Zinger, I.

    2004-01-01

    The EC-funded FASSET (Framework for Assessment of Environmental Impact) project collated information on the transfer, dosimetry, and effects of ionising radiation on wildlife. A major output from the project is the FASSET Radiation Effects Database (FRED). A review of the information contained within FRED highlighted that information on the effects of low-dose, chronic exposure was, at best, fragmentary. However, these data are required to define the dose effect relationships needed to underpin the assessment tools that are being developed. To address this requirement, a series of four Good Practice Guides (GPGs) has been produced as part of a protocol development framework. This framework aims to harmonise experimental approaches, with a view to ensuring that all necessary data on appropriate endpoints are collected, so that dose effect relationships can be determined. The GPGs cover test species selection, endpoint selection, radiation exposure and experimental design considerations. A key is used to guide researchers through the GPGs and the decisions made are recorded on an output pro-forma. The completed pro-forma forms the basis of the experimental protocol. The pro-forma also indicates the information that should be included when presenting the results of the experiment. Standardising approaches ensures that results are comparable between experiments and that they are suitable for determining dose effect relationships. This protocol development framework has been adopted by the UK Environment Agency as a document upon which future Agency-funded experimental work on the effects of chronic, low-level exposure to ionising radiation will be based. It is hoped that the framework will gain acceptance in the wider scientific community and facilitate addressing the knowledge gaps that have been identified in order that successful protection of non-human biota can be demonstrated. (author)

  18. Safe application of a restrictive transfusion protocol in moderate-risk patients undergoing cardiac operations.

    Science.gov (United States)

    Song, Howard K; von Heymann, Christian; Jespersen, Christian M; Karkouti, Keyvan; Korte, Wolfgang; Levy, Jerrold H; Ranucci, Marco; Saugstrup, Trine; Sellke, Frank W

    2014-05-01

    Perioperative red blood cell transfusion is associated with adverse outcomes after cardiac operations. Although restrictive transfusion protocols have been developed, their safety and efficacy are not well demonstrated, and considerable variation in transfusion practice persists. We report our experience with a restrictive transfusion protocol. We analyzed the outcomes in 409 patients undergoing cardiac operations enrolled in a trial conducted at 30 centers worldwide. Blood products were administered on the basis of a transfusion algorithm applied across all centers, with a restrictive transfusion trigger of hemoglobin less than or equal to 6 g/dL. Transfusion was acceptable but not mandatory for hemoglobin 6 to 8 g/dL. For hemoglobin 8 to 10 g/dL, transfusion was acceptable only with evidence for end-organ ischemia. The patient population was moderately complex, with 20.5% having combined procedures and 29.6% having nonelective operations. The mean EuroSCORE for the population was 4.3, which predicted a substantial incidence of morbidity and mortality. Actual outcomes were excellent, with observed mortality of 0.49% and rates of cerebrovascular accident, myocardial infarction, and acute renal failure 1.2%, 6.1%, and 0.98%, respectively. The frequency of red blood cell transfusion was 33.7%, which varied significantly by center. Most transfusions (71.9%) were administered for hemoglobin 6 to 8 g/dL; 21.4% were administered for hemoglobin 8 to 10 g/dL with evidence for end-organ ischemia; 65.0% of patients avoided allogeneic transfusion altogether. A restrictive transfusion protocol can be safely applied in the care of moderate-risk patients undergoing cardiac operations. This strategy has significant potential to reduce transfusion and resource utilization in these patients, standardize transfusion practices across institutions, and increase the safety of cardiac operations. Copyright © 2014 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights

  19. Applications of the Italian protocol for the calibration of brachytherapy sources

    International Nuclear Information System (INIS)

    Piermattei, A.; Azario, L.

    1997-01-01

    The Associazione Italiana di Fisica Biomedica (AIFB; Italian Association of Biomedical Physics) has adopted the Italian protocol for the calibration of brachytherapy sources. The AIFB protocol allows measurements of the reference air kerma rate, dK/dt r , within 1.7% (1σ). To measure dK/dt r the AIFB protocol has identified a direct and an indirect procedure. The direct procedure is based on the use of spherical or cylindrical ionization chambers as local reference dosimeters positioned along the transverse bisector axis of the source. Once the source is specified by a dK/dt r value, this can be used to calibrate a field instrument, such as a well-type ionization chamber, for further source calibrations by means of an indirect procedure. This paper reports the results obtained by the Physics Laboratory of the Universita Cattolica del S Cuore (PL-UCSC), in terms of dK/dt r calibration of five types of source, 169 Yb, 192 Ir and 137 Cs. The role of the dK/dt r determination for a brachytherapy source has been underlined when a new source such as the 169 Yb seed model X1267 has been proposed for clinical use. The dK/dt r values for 137 Cs spherical sources differed by 5% from the vendor's mean value. The five types of source calibrated in terms of dK/dt r were used to obtain the calibration factor, N K r source , of an HDR-1000 well-type ionization chamber. (author)

  20. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  1. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    DEFF Research Database (Denmark)

    Mikkelsen, Gert Læssøe; Keller, Marcel; Rupp, Andy

    2012-01-01

    , such as identification schemes, electronic cash (e-cash), and anonymous credentials. We present a security model for threshold proofs of knowledge and develop threshold versions of well-known primitives such as range proofs, zero-knowledge proofs for preimages of homomorphisms (which generalizes PoKs of discrete...... efficient (when compared to a general MPC approach). In comparison to the original protocols only the prover’s (or user’s) side is modified while the other side stays untouched. In particular, it is oblivious to the other party whether it interacts with a distributed prover (or user) or one as defined...

  2. A Survey on Application Layer Protocols for the Internet of Things

    OpenAIRE

    Karagiannis, Vasileios; Chatzimisios, Periklis; Vázquez-Gallego, Francisco; Alonso-Zárate, Jesús

    2015-01-01

    It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The framework that current IoT platforms use consists mostly in technol...

  3. A web-based application for initial screening of living kidney donors: development, implementation and evaluation.

    Science.gov (United States)

    Moore, D R; Feurer, I D; Zavala, E Y; Shaffer, D; Karp, S; Hoy, H; Moore, D E

    2013-02-01

    Most centers utilize phone or written surveys to screen candidates who self-refer to be living kidney donors. To increase efficiency and reduce resource utilization, we developed a web-based application to screen kidney donor candidates. The aim of this study was to evaluate the use of this web-based application. Method and time of referral were tabulated and descriptive statistics summarized demographic characteristics. Time series analyses evaluated use over time. Between January 1, 2011 and March 31, 2012, 1200 candidates self-referred to be living kidney donors at our center. Eight hundred one candidates (67%) completed the web-based survey and 399 (33%) completed a phone survey. Thirty-nine percent of donors accessed the application on nights and weekends. Postimplementation of the web-based application, there was a statistically significant increase (p web-based application as opposed to telephone contact. Also, there was a significant increase (p = 0.025) in the total number of self-referrals post-implementation from 61 to 116 per month. An interactive web-based application is an effective strategy for the initial screening of donor candidates. The web-based application increased the ability to interface with donors, process them efficiently and ultimately increased donor self-referral at our center. © Copyright 2012 The American Society of Transplantation and the American Society of Transplant Surgeons.

  4. Safeguards agreement and additional protocol - IAEA instruments for control of nuclear materials distribution and their application in Tajikistan

    International Nuclear Information System (INIS)

    Nasrulloev, Kh.; Mirsaidov, U.

    2010-01-01

    -proliferation regime. For strengthening of nuclear materials non-proliferation regime it is necessary to: strengthen safeguards; more effective export control and efforts on black market network liquidation; effective activities on search of orphan sources; efforts exhorting demand reduce for nuclear weapons. For safeguards strengthening it is necessary to conduct annual IAEA inspections. Taking into account that Additional protocol provides to IAEA considerably more wide access to information and IAEA should make use of its privileges. Some countries signed Nuclear weapon non-proliferation treaty but unfortunately didn't signed Safeguards Agreement and Additional Protocol. That's why Additional Protocol should be ratified by all countries, which can be universal standard of nuclear inspection. Provider states should make Additional protocol as condition for license issuance on nuclear materials, services and technology export. Tajikistan provides necessary information to IAEA in accordance with Additional Protocol: location where nuclear material is available or might be available; information about all buildings where nuclear material could be available; ready to provide assistance for IAEA missions on environmental sampling; provides to IAEA inspectors multiple visas; information about scientific and research works. Exclusive importance for IAEA safeguards agreement is high safeguards culture. IAEA should regularly conduct seminars on advanced assessment of safeguards culture - exactly as recommends to nuclear sites regularly to assess safety culture, and to undertake steps on elimination of any revealed shortcomings. One of the important safeguards criteria is nuclear knowledge preservation. IAEA member-states should advocate initiative on attraction and next generation specialists training and provide them a stimulus to make a carrier in IAEA. Important safeguards element is more effective export control and efforts to liquidate black markets network. The experience

  5. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    2005-04-01

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  6. Abdominal stab wound protocol: prospective study documents applicability for widespread use.

    Science.gov (United States)

    Rosemurgy, A S; Albrink, M H; Olson, S M; Sherman, H; Albertini, J; Kramer, R; Camps, M; Reiss, A

    1995-02-01

    Traditionally, stab wounds violating the abdominal wall fascia led to exploratory celiotomy that was often nontherapeutic. In an attempt to limit the number of nontherapeutic celiotomies (NTC), we devised a protocol to prospectively study stab wounds violating the anterior abdominal wall fascia. Through protocol, abdominal stab wounds were explored in stable adults. If the anterior fascia was violated, paracentesis and, if necessary, peritoneal lavage was undertaken in the absence of previous abdominal surgery. If evisceration was noted, it was reduced and the patient lavaged. Fascial penetration was noted in 72 patients. 46 patients underwent celiotomy: because of shock/peritonitis in 8 (2 NTC), fascial penetration with a history of previous celiotomy in 7 (5 NTC), positive paracentesis in 20 (5 NTC), or positive lavage in 10 (4 NTC). One patient underwent late celiotomy without ill-effect after a negative lavage because she subsequently developed fever and localized peritonitis (ice pick injury to cecum). Eleven patients had evisceration; nine underwent celiotomy. Patients with abdominal stab wounds can be selectively managed safely. More than one-third with fascial penetration, some with evisceration, avoided exploration. Only one patient underwent delayed celiotomy and did so without detriment. Nontherapeutic celiotomy rates were highest in patients with previous abdominal surgery who, thereby, could not undergo paracentesis/lavage; excluding these patients, the nontherapeutic celiotomy rate was 17% (11/65) for those with fascial penetration.

  7. Cyber Security in Industrial Control Systems and SCADA Applications: Modbus TCP Protocol Example

    Directory of Open Access Journals (Sweden)

    Erdal IRMAK

    2017-12-01

    Full Text Available Electrical energy generation, transmission and distribution systems are evaluated in terms of national security dimension and defined as critical infrastructures. Monitoring and controlling of these systems is provided by Industrial Control Systems (ICS or Supervisory Control and Data Acquisition (SCADA systems. According to the latest advances in communication and internet technology, ICS/SCADA systems have started to become integrated with these systems. As a result of this situation, current or existing vulnerabilities in information and communication technology affect to SCADA systems directly. Therefore, this paper focuses on the cyber security of ICS/SCADA systems. It has been proved that the lack of authentication detected in Modbus TCP protocol, one of the most used in ICS/SCADA systems, can be exploited. In order to solve this security issue, a software is developed using the Python programming language for blocking or mitigating the cyber attacks. The proposed solution is subjected to several tests and results show that the attacks can be prevented successfully. Thus, it is considered that the proposed work will contribute to the security of ICS/SCADA systems and the industrial protocols using for communicating these systems.

  8. A national evaluation of a dissemination and implementation initiative to enhance primary care practice capacity and improve cardiovascular disease care: the ESCALATES study protocol.

    Science.gov (United States)

    Cohen, Deborah J; Balasubramanian, Bijal A; Gordon, Leah; Marino, Miguel; Ono, Sarah; Solberg, Leif I; Crabtree, Benjamin F; Stange, Kurt C; Davis, Melinda; Miller, William L; Damschroder, Laura J; McConnell, K John; Creswell, John

    2016-06-29

    The Agency for Healthcare Research and Quality (AHRQ) launched the EvidenceNOW Initiative to rapidly disseminate and implement evidence-based cardiovascular disease (CVD) preventive care in smaller primary care practices. AHRQ funded eight grantees (seven regional Cooperatives and one independent national evaluation) to participate in EvidenceNOW. The national evaluation examines quality improvement efforts and outcomes for more than 1500 small primary care practices (restricted to those with fewer than ten physicians per clinic). Examples of external support include practice facilitation, expert consultation, performance feedback, and educational materials and activities. This paper describes the study protocol for the EvidenceNOW national evaluation, which is called Evaluating System Change to Advance Learning and Take Evidence to Scale (ESCALATES). This prospective observational study will examine the portfolio of EvidenceNOW Cooperatives using both qualitative and quantitative data. Qualitative data include: online implementation diaries, observation and interviews at Cooperatives and practices, and systematic assessment of context from the perspective of Cooperative team members. Quantitative data include: practice-level performance on clinical quality measures (aspirin prescribing, blood pressure and cholesterol control, and smoking cessation; ABCS) collected by Cooperatives from electronic health records (EHRs); practice and practice member surveys to assess practice capacity and other organizational and structural characteristics; and systematic tracking of intervention delivery. Quantitative, qualitative, and mixed methods analyses will be conducted to examine how Cooperatives organize to provide external support to practices, to compare effectiveness of the dissemination and implementation approaches they implement, and to examine how regional variations and other organization and contextual factors influence implementation and effectiveness. ESCALATES is

  9. Evaluating Data Abstraction Assistant, a novel software application for data abstraction during systematic reviews: protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ian J. Saldanha

    2016-11-01

    Full Text Available Abstract Background Data abstraction, a critical systematic review step, is time-consuming and prone to errors. Current standards for approaches to data abstraction rest on a weak evidence base. We developed the Data Abstraction Assistant (DAA, a novel software application designed to facilitate the abstraction process by allowing users to (1 view study article PDFs juxtaposed to electronic data abstraction forms linked to a data abstraction system, (2 highlight (or “pin” the location of the text in the PDF, and (3 copy relevant text from the PDF into the form. We describe the design of a randomized controlled trial (RCT that compares the relative effectiveness of (A DAA-facilitated single abstraction plus verification by a second person, (B traditional (non-DAA-facilitated single abstraction plus verification by a second person, and (C traditional independent dual abstraction plus adjudication to ascertain the accuracy and efficiency of abstraction. Methods This is an online, randomized, three-arm, crossover trial. We will enroll 24 pairs of abstractors (i.e., sample size is 48 participants, each pair comprising one less and one more experienced abstractor. Pairs will be randomized to abstract data from six articles, two under each of the three approaches. Abstractors will complete pre-tested data abstraction forms using the Systematic Review Data Repository (SRDR, an online data abstraction system. The primary outcomes are (1 proportion of data items abstracted that constitute an error (compared with an answer key and (2 total time taken to complete abstraction (by two abstractors in the pair, including verification and/or adjudication. Discussion The DAA trial uses a practical design to test a novel software application as a tool to help improve the accuracy and efficiency of the data abstraction process during systematic reviews. Findings from the DAA trial will provide much-needed evidence to strengthen current recommendations for data

  10. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  11. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  12. Medical Student Perceptions of Learner-Initiated Feedback Using a Mobile Web Application

    Directory of Open Access Journals (Sweden)

    Amy C Robertson

    2017-12-01

    Full Text Available Feedback, especially timely, specific, and actionable feedback, frequently does not occur. Efforts to better understand methods to improve the effectiveness of feedback are an important area of educational research. This study represents preliminary work as part of a plan to investigate the perceptions of a student-driven system to request feedback from faculty using a mobile device and Web-based application. We hypothesize that medical students will perceive learner-initiated, timely feedback to be an essential component of clinical education. Furthermore, we predict that students will recognize the use of a mobile device and Web application to be an advantageous and effective method when requesting feedback from supervising physicians. Focus group data from 18 students enrolled in a 4-week anesthesia clerkship revealed the following themes: (1 students often have to solicit feedback, (2 timely feedback is perceived as being advantageous, (3 feedback from faculty is perceived to be more effective, (4 requesting feedback from faculty physicians poses challenges, (5 the decision to request feedback may be influenced by the student’s clinical performance, and (6 using a mobile device and Web application may not guarantee timely feedback. Students perceived using a mobile Web-based application to initiate feedback from supervising physicians to be a valuable method of assessment. However, challenges and barriers were identified.

  13. Development of a quality assurance protocol for peripheral subtraction imaging applications

    International Nuclear Information System (INIS)

    Walsh, C.; Murphy, D.; O'Hare, N.

    2002-01-01

    Peripheral subtraction scanning is used to trace the blood vessels of upper and lower extremities. In some modern C-arm fluoroscopy systems this function is performed automatically. In this mode the system is programmed to advance and stop in a series of steps taking a mask image at each point. The system then repeats each step after the contrast agent has been injected, and produces a DSA image at each point. Current radiographic quality assurance protocols do not address this feature. This note reviews methods of measuring system vibration while images are being acquired in automated peripheral stepping. The effect on image quality pre- and post-image processing is assessed. Results show that peripheral stepping DSA does not provide the same degree of image quality as static DSA. In examining static test objects, the major cause of the reduction in image quality is misregistration due to vibration of the image intensifier during imaging. (author)

  14. Development and application of safety and waste management protocols for the Laboratorio de Ingenieria Quimica

    International Nuclear Information System (INIS)

    Scott Jimenez, Stephanie

    2014-01-01

    Security and waste management protocols are developed for the laboratory de la Escuela de Ingenieria Quimica at the Universidad de Costa Rica. The protocols are elaborated according to the provisions and guidelines stipulated in the Costa Rican legislation, technical references and documents issued by the chemical regency of the Universidad de Costa Rica. An inspection guide was prepared and applied as diagnostic tool for the evaluation of the safety conditions and handling of chemical substances in the laboratory. Inspections of the physical plant and interviews to area managers were realized. The results obtained have allowed to implement improvements of the activities in safe working environment conditions and teaching; and an adequate signaling and demarcation of the facilities, location and recharge of fire extinguishers. An emergency plan is elaborated for the Laboratorio de Ingenieria Quimica, by performing a sequence of stages proposed by Comision Nacional de Emergencias. In addition, a plan for the safe and effective management of waste generated is made based on the reagents most frequently used in the different practices. The method of storage Flinn Scientific was selected as the most appropriate method to organize and distribute chemicals in the laboratory reagent storage area, obtaining the highest percentage in the decision matrix. Security aspects in the registration and documentation system implemented in the laboratory administration are evaluated by a checklist. This assessment has allowed to propose improvements, to increase the efficiency and to obtain an easy storage, control and a fast search of the information by means of the procedures documented and elaborated. Some of the recommendations proposed have been the establishment of an emergency action committee, the reduction of unnecessary quantities of chemicals stored, training on safety, operation of fire extinguisher and first aid; and construction of an emergency exit, etc. [es

  15. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    NARCIS (Netherlands)

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the

  16. Initial assessment of public perception and acceptance of Geothermal Energy applications in Çanakkale, NW Turkey.

    Science.gov (United States)

    Sedat Çetiner, Ziya; Çekiç, Osman; Ertekin, Can; Bakırcı, Mesut

    2016-04-01

    Growing need of energy in global scale has resulted in increasing number of research and development of renewable energy technologies. Turkey, being very rich in the renewable energy resources, has recently paid special attention to accelerate utilization of these resources to reduce the carbon based energy cost. Among these, Geothermal Energy resources in the country, mainly utilized in district heating and balneological applications, has been shifted toward harvesting electric energy in the shed of recent incentives. While these developments are happening at the policy level, the knowledge and the perception of the public is important to shape the future policies and acceptance of such resources in daily life. In light of these developments, the aim of this study is to identify and analyze the public awareness and acceptance mechanisms for the successful deployment of future and ongoing geothermal investments in Çanakkale region of the Biga Peninsula using geological, social and economic constraints in a well-defined questionnaire. The study employed a mixed method to explore the public perception. Mixed method studies involve qualitative and quantitative techniques and intends to explore an issue in-depth. Thus a sequential explanatory design was used to gather the public's perception. Exploratory design involves a qualitative study followed by a design of a quantitative survey and analysis. The researchers, firs, interviewed 24 college students about their knowledge and perceptions of geothermal resources using a semi-structured interview protocol. The protocol comprised of 8 open ended questions. With the help of the literature and the qualitative survey results, an item database with 51 questions were constructed. The initial survey and the items then were sent to 5 experts. Following the expert review, the survey was given its final form and the item numbers were dropped to 34. Then this survey was applied to a group of 100 college students. The survey also

  17. Evaluation of two protocols for low-level laser application in patients submitted to orthodontic treatment

    Directory of Open Access Journals (Sweden)

    Mariana Marquezan

    2013-02-01

    Full Text Available INTRODUCTION: Different low-level laser (LLL irradiation protocols have been tested to accelerate orthodontic tooth movement (OTM. Nevertheless, divergent results have been obtained. It was suggested that the stimulatory action of low level laser irradiation occurs during the proliferation and differentiation stages of bone cellular precursors, but not during later stages. OBJECTIVE: The purpose of this study was to determine the effect of two protocols of LLL irradiation on experimental tooth movement: One with daily irradiations and another with irradiations during the early stages. METHODS: Thirty-six rats were divided into control groups (CG1, CG2, CG3 and irradiated groups (IrG1, IrG2, IrG3 according to the presence of: experimental tooth movement, laser irradiation, type of laser irradiation protocol and date of euthanasia (3th or 8th day of experiment. At the end of experimental periods, a quantitative evaluation of the amount of OTM was made and the reactions of the periodontium were analyzed by describing cellular and tissue reactions and by counting blood vessels. RESULTS: The amount of OTM revealed no significant differences between groups in the same experimental period (p INTRODUÇÃO: diferentes protocolos de irradiação por laser de baixa potência (LBP têm sido testados para potencializar o movimento ortodôntico; entretanto, há resultados divergentes. Foi sugerido que seu efeito bioestimulador ocorre nas fases de proliferação e diferenciação celular, não agindo em estágios tardios. OBJETIVO: avaliar o efeito de dois protocolos de irradiação do LBP na movimentação ortodôntica: um com irradiações diárias e outro em que irradiações foram realizadas apenas nos períodos iniciais. MÉTODOS: trinta e seis ratos Wistar foram divididos em grupos controles (GC1, GC2 e GC3 e irradiados (GIr1, GIr2 e GIr3, de acordo com a presença de dispositivo ortodôntico, a presença de irradiação, o tipo de protocolo de irradia

  18. Athletic altitude training protocols and their application in preparation for mountainous operations.

    Science.gov (United States)

    Heil, K M; Keenan, A C M

    2014-01-01

    In recent years, small scale counter-insurgency and expeditionary operations have frequently taken place in mountainous, high-altitude areas. Preparation of soldiers for these environments has typically focussed on extended stays at altitude to ensure physiological acclimatisation. However, with the likelihood that future UK deployments may be unpredictable and thus with little time for preparation, is there a means by which the same acclimatisation may be achieved? The field of athletics has been researching such adaptations since the rise of the elite North African long-distance runners in the 1960s. These athletes all lived high above sea level and had become accustomed to performing in the relatively hypoxic environment found at high altitudes. The research has focussed on eliciting physiological acclimatisation in as short a time as possible, while maintaining the ability to train at the correct intensity. In the following review of altitude training we highlight areas for future investigation and assess whether protocols developed for athletes can be applied to military personnel.

  19. The Applications of Gold Nanoparticle-Initialed Chemiluminescence in Biomedical Detection

    Science.gov (United States)

    Liu, Zezhong; Zhao, Furong; Gao, Shandian; Shao, Junjun; Chang, Huiyun

    2016-10-01

    Chemiluminescence technique as a novel detection method has gained much attention in recent years owning to the merits of high sensitivity, wider linear ranges, and low background signal. Similarly, nanotechnology especially for gold nanoparticles has emerged as detection tools due to their unique physical and chemical properties. Recently, it has become increasingly popular to couple gold nanoparticles with chemiluminescence technique in biological agents' detection. In this review, we describe the superiority of both chemiluminescence and gold nanoparticles and conclude the different applications of gold nanoparticle-initialed chemiluminescence in biomedical detection.

  20. A web application for moderation training: Initial results of a randomized clinical trial1

    Science.gov (United States)

    Hester, Reid K.; Delaney, Harold D.; Campbell, William; Handmaker, Nancy

    2009-01-01

    Eighty four heavy drinkers who responded to a newspaper recruitment ad were randomly assigned to receive either: a) training in a moderate drinking protocol via an Internet-based program (www.moderatedrinking.com) and use of the online resources of Moderation Management (MM) (www.moderation.org) or b) use of the online resources of MM alone. Follow-ups are being conducted at 3, 6, and 12 months. Results of the recently completed 3 month follow-up (86% follow-up) indicated both groups significantly reduced their drinking based on these variables: standard drinks per week; percent days abstinent; and mean BAC per drinking day. Both groups also significantly reduced their alcohol-related problems. Relative to the control group the experimental group had better outcomes on percent days abstinent and log Drinks per Drinking Day. These short-term outcome data provide evidence for the effectiveness of both the moderate drinking web application and of the resources available online at MM in helping heavy drinkers reduce their drinking and alcohol-related problems. PMID:19339137

  1. Providing Geospatial Education and Real World Applications of Data across the Climate Initiative Themes

    Science.gov (United States)

    Weigel, A. M.; Griffin, R.; Bugbee, K.

    2015-12-01

    Various organizations such as the Group on Earth Observations (GEO) have developed a structure for general thematic areas in Earth science research, however the Climate Data Initiative (CDI) is addressing the challenging goal of organizing such datasets around core themes specifically related to climate change impacts. These thematic areas, which currently include coastal flooding, food resilience, ecosystem vulnerability, water, transportation, energy infrastructure, and human health, form the core of a new college course at the University of Alabama in Huntsville developed around real-world applications in the Earth sciences. The goal of this course is to educate students on the data available and scope of GIS applications in Earth science across the CDI climate themes. Real world applications and datasets serve as a pedagogical tool that provide a useful medium for instruction in scientific geospatial analysis and GIS software. With a wide range of potential research areas that fall under the rubric of "Earth science", thematic foci can help to structure a student's understanding of the potential uses of GIS across sub-disciplines, while communicating core data processing concepts. The learning modules and use-case scenarios for this course demonstrate the potential applications of CDI data to undergraduate and graduate Earth science students.

  2. Wikis and Collaborative Writing Applications in Health Care: A Scoping Review Protocol

    Science.gov (United States)

    van de Belt, Tom H; Grajales III, Francisco J; Eysenbach, Gunther; Aubin, Karine; Gold, Irving; Gagnon, Marie-Pierre; Kuziemsky, Craig E; Turgeon, Alexis F; Poitras, Julien; Faber, Marjan J; Kremer, Jan A.M; Heldoorn, Marcel; Bilodeau, Andrea; Légaré, France

    2012-01-01

    The rapid rise in the use of collaborative writing applications (eg, wikis, Google Documents, and Google Knol) has created the need for a systematic synthesis of the evidence of their impact as knowledge translation (KT) tools in the health care sector and for an inventory of the factors that affect their use. While researchers have conducted systematic reviews on a range of software-based information and communication technologies as well as other social media (eg, virtual communities of practice, virtual peer-to-peer communities, and electronic support groups), none have reviewed collaborative writing applications in the medical sector. The overarching goal of this project is to explore the depth and breadth of evidence for the use of collaborative writing applications in health care. Thus, the purposes of this scoping review will be to (1) map the literature on collaborative writing applications; (2) compare the applications’ features; (3) describe the evidence of each application’s positive and negative effects as a KT intervention in health care; (4) inventory and describe the barriers and facilitators that affect the applications’ use; and (5) produce an action plan and a research agenda. A six-stage framework for scoping reviews will be used: (1) identifying the research question; (2) identifying relevant studies within the selected databases (using the EPPI-Reviewer software to classify the studies); (3) selecting studies (an iterative process in which two reviewers search the literature, refine the search strategy, and review articles for inclusion); (4) charting the data (using EPPI-Reviewer’s data-charting form); (5) collating, summarizing, and reporting the results (performing a descriptive, numerical, and interpretive synthesis); and (6) consulting knowledge users during three planned meetings. Since this scoping review concerns the use of collaborative writing applications as KT interventions in health care, we will use the Knowledge to Action

  3. Application Platforms for the Internet of Things: Theory, Architecture, Protocols, Data Formats, and Privacy

    OpenAIRE

    Collina, Matteo

    2014-01-01

    The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using p...

  4. Ultrasound assisted extraction of food and natural products. Mechanisms, techniques, combinations, protocols and applications. A review.

    Science.gov (United States)

    Chemat, Farid; Rombaut, Natacha; Sicaire, Anne-Gaëlle; Meullemiestre, Alice; Fabiano-Tixier, Anne-Sylvie; Abert-Vian, Maryline

    2017-01-01

    This review presents a complete picture of current knowledge on ultrasound-assisted extraction (UAE) in food ingredients and products, nutraceutics, cosmetic, pharmaceutical and bioenergy applications. It provides the necessary theoretical background and some details about extraction by ultrasound, the techniques and their combinations, the mechanisms (fragmentation, erosion, capillarity, detexturation, and sonoporation), applications from laboratory to industry, security, and environmental impacts. In addition, the ultrasound extraction procedures and the important parameters influencing its performance are also included, together with the advantages and the drawbacks of each UAE techniques. Ultrasound-assisted extraction is a research topic, which affects several fields of modern plant-based chemistry. All the reported applications have shown that ultrasound-assisted extraction is a green and economically viable alternative to conventional techniques for food and natural products. The main benefits are decrease of extraction and processing time, the amount of energy and solvents used, unit operations, and CO 2 emissions. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  6. Impact of reduced-radiation dual-energy protocols using 320-detector row computed tomography for analyzing urinary calculus components: initial in vitro evaluation.

    Science.gov (United States)

    Cai, Xiangran; Zhou, Qingchun; Yu, Juan; Xian, Zhaohui; Feng, Youzhen; Yang, Wencai; Mo, Xukai

    2014-10-01

    To evaluate the impact of reduced-radiation dual-energy (DE) protocols using 320-detector row computed tomography on the differentiation of urinary calculus components. A total of 58 urinary calculi were placed into the same phantom and underwent DE scanning with 320-detector row computed tomography. Each calculus was scanned 4 times with the DE protocols using 135 kV and 80 kV tube voltage and different tube current combinations, including 100 mA and 570 mA (group A), 50 mA and 290 mA (group B), 30 mA and 170 mA (group C), and 10 mA and 60 mA (group D). The acquisition data of all 4 groups were then analyzed by stone DE analysis software, and the results were compared with x-ray diffraction analysis. Noise, contrast-to-noise ratio, and radiation dose were compared. Calculi were correctly identified in 56 of 58 stones (96.6%) using group A and B protocols. However, only 35 stones (60.3%) and 16 stones (27.6%) were correctly diagnosed using group C and D protocols, respectively. Mean noise increased significantly and mean contrast-to-noise ratio decreased significantly from groups A to D (P calculus component analysis while reducing patient radiation exposure to 1.81 mSv. Further reduction of tube currents may compromise diagnostic accuracy. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Study protocol for the FITR Heart Study: Feasibility, safety, adherence, and efficacy of high intensity interval training in a hospital-initiated rehabilitation program for coronary heart disease

    Directory of Open Access Journals (Sweden)

    Jenna Taylor

    2017-12-01

    Conclusions: This study aims to address the ongoing concerns regarding the practicality and safety of HIIT in CR programs. We anticipate study findings will lead to the development of a standardized protocol to facilitate CR programs to incorporate HIIT as a standard exercise option for appropriate patients.

  8. Development of a Land Use Mapping and Monitoring Protocol for the High Plains Region: A Multitemporal Remote Sensing Application

    Science.gov (United States)

    Price, Kevin P.; Nellis, M. Duane

    1996-01-01

    The purpose of this project was to develop a practical protocol that employs multitemporal remotely sensed imagery, integrated with environmental parameters to model and monitor agricultural and natural resources in the High Plains Region of the United States. The value of this project would be extended throughout the region via workshops targeted at carefully selected audiences and designed to transfer remote sensing technology and the methods and applications developed. Implementation of such a protocol using remotely sensed satellite imagery is critical for addressing many issues of regional importance, including: (1) Prediction of rural land use/land cover (LULC) categories within a region; (2) Use of rural LULC maps for successive years to monitor change; (3) Crop types derived from LULC maps as important inputs to water consumption models; (4) Early prediction of crop yields; (5) Multi-date maps of crop types to monitor patterns related to crop change; (6) Knowledge of crop types to monitor condition and improve prediction of crop yield; (7) More precise models of crop types and conditions to improve agricultural economic forecasts; (8;) Prediction of biomass for estimating vegetation production, soil protection from erosion forces, nonpoint source pollution, wildlife habitat quality and other related factors; (9) Crop type and condition information to more accurately predict production of biogeochemicals such as CO2, CH4, and other greenhouse gases that are inputs to global climate models; (10) Provide information regarding limiting factors (i.e., economic constraints of pumping, fertilizing, etc.) used in conjunction with other factors, such as changes in climate for predicting changes in rural LULC; (11) Accurate prediction of rural LULC used to assess the effectiveness of government programs such as the U.S. Soil Conservation Service (SCS) Conservation Reserve Program; and (12) Prediction of water demand based on rural LULC that can be related to rates of

  9. Initial experience on protocol optimization for integrated PET/MR%PET/MR一体机操作优化的初步经验

    Institute of Scientific and Technical Information of China (English)

    刘家金; 陈英茂; 张雄伟; 富丽萍; 田嘉禾; 尹大一; 徐白萱

    2014-01-01

    目的 通过比较PET/CT和PET/MR,初步探索PET/MR一体机的操作流程和成像优化方案.方法 228例患者同日内接受PET/CT和PET/MR检查,通过6种不同MR序列与PET采集组合方案,比较图像质量的优劣,以在保证诊断信息基础上缩短患者扫描时间的原则分析判断,并初步确定最优PET/MR一体机采集方案.结果 PET/MR结果与PET/CT相近,但其操作流程和注意事项有独特之处;在6种方案中,以躯干和头部各有独立序列组合、兼顾各向同性结构显示与突出病灶特点的方案6效果最优;PET/MR比PET/CT更易产生伪影.结论 在优化方案基础上,PET/MR可获得与PET/CT一致的诊断级图像,但PET/MR采集时间长、伪影多,有待进一步完善.%Objective To investigate the optimal workflow and protocol for integrated PET/MR by comparison with PET/CT.Methods A total of 228 patients were enrolled in this study for PET/CT and PET/MR evaluation on the same day.Six PET/MR protocols with different MR sequences but the same PET acquisition protocol were investigated and the optimal protocol was identified based on image quality,acquisition time and diagnostic performance.Results PET/MR workflow was similar to PET/CT,however,some special issues needed to be considered for PET/MR.Among the 6 protocols,protocol No.6 outperformed others for body and head regions.Types of artifacts were found more often in PET/MR than in PET/CT.Conclusions By optimizing the protocol,PET/MR could achieve almost the same diagnostic performance as PET/CT.However,the issues of long acquisition time and artifacts on PET/MR need to be further improved.

  10. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  11. A data acquisition protocol for a reactive wireless sensor network monitoring application.

    Science.gov (United States)

    Aderohunmu, Femi A; Brunelli, Davide; Deng, Jeremiah D; Purvis, Martin K

    2015-04-30

    Limiting energy consumption is one of the primary aims for most real-world deployments of wireless sensor networks. Unfortunately, attempts to optimize energy efficiency are often in conflict with the demand for network reactiveness to transmit urgent messages. In this article, we propose SWIFTNET: a reactive data acquisition scheme. It is built on the synergies arising from a combination of the data reduction methods and energy-efficient data compression schemes. Particularly, it combines compressed sensing, data prediction and adaptive sampling strategies. We show how this approach dramatically reduces the amount of unnecessary data transmission in the deployment for environmental monitoring and surveillance networks. SWIFTNET targets any monitoring applications that require high reactiveness with aggressive data collection and transmission. To test the performance of this method, we present a real-world testbed for a wildfire monitoring as a use-case. The results from our in-house deployment testbed of 15 nodes have proven to be favorable. On average, over 50% communication reduction when compared with a default adaptive prediction method is achieved without any loss in accuracy. In addition, SWIFTNET is able to guarantee reactiveness by adjusting the sampling interval from 5 min up to 15 s in our application domain.

  12. Low-power low-latency MAC protocol for aeronautical applications

    Science.gov (United States)

    Sabater, Jordi; Kluge, Martin; Bovelli, Sergio; Schalk, Josef

    2007-05-01

    This paper describes asynchronous MAC (Medium Access Control) strategies based on the IEEE 802.15.4 physical layer for wireless aeronautical applications where low power and low latency are important requirements as well as security and data integrity. Sensor data is acquired and collected on request, by means of a mobile device, and later stored in a centralized database. In order to have the smallest power consumption the wireless sensor has to remain in deep sleep mode as long as possible and wake up and listen periodically for RF activity. If its unique ID is mentioned in the destination address field, the complete frame is received, processed and replied if necessary. If the detected packet is addressed to another sensor the reception will stop immediately and the wireless sensor will go into deep sleep mode again. Listening instead of sending actively does not 'pollute' the already crowded 2.45GHz spectrum, reduces collisions and increases security. The mobile data concentrator can not be synchronized with all the sensors installed in a distributed environment, therefore smart asynchronous data transmission strategies are needed to reduce latencies and increase throughput. For the considered application, sensors are independent of each other, simply share the medium and together with the data concentrator are organized in a star network topology. The centre of the star is the concentrator which is rarely in range. It coordinates and activates the wireless sensor nodes to collect the measured data.

  13. Comparison of Diffusion MRI Acquisition Protocols for the In Vivo Characterization of the Mouse Spinal Cord: Variability Analysis and Application to an Amyotrophic Lateral Sclerosis Model.

    Science.gov (United States)

    Figini, Matteo; Scotti, Alessandro; Marcuzzo, Stefania; Bonanno, Silvia; Padelli, Francesco; Moreno-Manzano, Victoria; García-Verdugo, José Manuel; Bernasconi, Pia; Mantegazza, Renato; Bruzzone, Maria Grazia; Zucca, Ileana

    2016-01-01

    Diffusion-weighted Magnetic Resonance Imaging (dMRI) has relevant applications in the microstructural characterization of the spinal cord, especially in neurodegenerative diseases. Animal models have a pivotal role in the study of such diseases; however, in vivo spinal dMRI of small animals entails additional challenges that require a systematical investigation of acquisition parameters. The purpose of this study is to compare three acquisition protocols and identify the scanning parameters allowing a robust estimation of the main diffusion quantities and a good sensitivity to neurodegeneration in the mouse spinal cord. For all the protocols, the signal-to-noise and contrast-to noise ratios and the mean value and variability of Diffusion Tensor metrics were evaluated in healthy controls. For the estimation of fractional anisotropy less variability was provided by protocols with more diffusion directions, for the estimation of mean, axial and radial diffusivity by protocols with fewer diffusion directions and higher diffusion weighting. Intermediate features (12 directions, b = 1200 s/mm2) provided the overall minimum inter- and intra-subject variability in most cases. In order to test the diagnostic sensitivity of the protocols, 7 G93A-SOD1 mice (model of amyotrophic lateral sclerosis) at 10 and 17 weeks of age were scanned and the derived diffusion parameters compared with those estimated in age-matched healthy animals. The protocols with an intermediate or high number of diffusion directions provided the best differentiation between the two groups at week 17, whereas only few local significant differences were highlighted at week 10. According to our results, a dMRI protocol with an intermediate number of diffusion gradient directions and a relatively high diffusion weighting is optimal for spinal cord imaging. Further work is needed to confirm these results and for a finer tuning of acquisition parameters. Nevertheless, our findings could be important for the

  14. Application of shielding calculation of high-energy linear accelerators based on the NCRP-151 protocol

    International Nuclear Information System (INIS)

    Torres Pozas, S.; Monja Rey, P. de la; Sanchez Carrasca, M.; Yanez Lopez, D.; Macias Verde, D.; Martin Oliva, R.

    2011-01-01

    In recent years, the progress experienced in cancer treatment with ionizing radiation can deliver higher doses to smaller volumes and better shaped, making it necessary to take into account new aspects in the calculation of structural barriers. Furthermore, given that forecasts suggest that in the near future will install a large number of accelerators, or existing ones modified, we believe a useful tool to estimate the thickness of the structural barriers of treatment rooms. The shielding calculation methods are based on standard DIN 6847-2 and the recommendations given by the NCRP 151. In our experience we found only estimates originated from the DIN. Therefore, we considered interesting to develop an application that incorporates the formulation suggested by the NCRP, together with previous work based on the rules DIN allow us to establish a comparison between the results of both methods. (Author)

  15. A smartphone application for treating depressive symptoms: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Deady, M; Johnston, D A; Glozier, N; Milne, D; Choi, I; Mackinnon, A; Mykletun, A; Calvo, R A; Gayed, A; Bryant, R; Christensen, H; Harvey, S B

    2018-06-01

    Depression is a commonly occurring disorder linked to diminished role functioning and quality of life. The development of treatments that overcome barriers to accessing treatment remains an important area of clinical research as most people delay or do not receive treatment at an appropriate time. The workplace is an ideal setting to roll-out an intervention, particularly given the substantial psychological benefits associated with remaining in the workforce. Mobile health (mhealth) interventions utilising smartphone applications (apps) offer novel solutions to disseminating evidence based programs, however few apps have undergone rigorous testing. The present study aims to evaluate the effectiveness of a smartphone app designed to treat depressive symptoms in workers. The present study is a multicentre randomised controlled trial (RCT), comparing the effectiveness of the intervention to that of an attention control. The primary outcome measured will be reduced depressive symptoms at 3 months. Secondary outcomes such as wellbeing and work performance will also be measured. Employees from a range of industries will be recruited via a mixture of targeted social media advertising and Industry partners. Participants will be included if they present with likely current depression at baseline. Following baseline assessment (administered within the app), participants will be randomised to receive one of two versions of the Headgear application: 1) Intervention (a 30-day mental health intervention focusing on behavioural activation and mindfulness), or 2) attention control app (mood monitoring for 30 days). Participants will be blinded to their allocation. Analyses will be conducted within an intention to treat framework using mixed modelling. The results of this trial will provide valuable information about the effectiveness of mhealth interventions in the treatment of depressive symptoms in a workplace context. The current trial is registered with the Australian and

  16. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  17. Application of expert system technology to nondestructive waste assay - initial prototype model

    Energy Technology Data Exchange (ETDEWEB)

    Becker, G.K.; Determan, J.C. [Idaho National Engineering and Environmental Lab., Idaho Falls, ID (United States)

    1997-11-01

    Expert system technology has been identified as a technique useful for filling certain types of technology/capability gaps in existing waste nondestructive assay (NDA) applications. In particular, expert system techniques are being investigated with the intent of providing on-line evaluation of acquired data and/or directed acquisition of data in a manner that mimics the logic and decision making process a waste NDA expert would employ. The space from which information and data sources utilized in this process is much expanded with respect to the algorithmic approach typically utilized in waste NDA. Expert system technology provides a mechanism to manage and reason with this expanded information/data set. The material presented in this paper concerns initial studies and a resultant prototype expert system that incorporates pertinent information, and evaluation logic and decision processes, for the purpose of validating acquired waste NDA measurement assays. 6 refs., 6 figs.

  18. Application of expert system technology to nondestructive waste assay - initial prototype model

    International Nuclear Information System (INIS)

    Becker, G.K.; Determan, J.C.

    1997-01-01

    Expert system technology has been identified as a technique useful for filling certain types of technology/capability gaps in existing waste nondestructive assay (NDA) applications. In particular, expert system techniques are being investigated with the intent of providing on-line evaluation of acquired data and/or directed acquisition of data in a manner that mimics the logic and decision making process a waste NDA expert would employ. The space from which information and data sources utilized in this process is much expanded with respect to the algorithmic approach typically utilized in waste NDA. Expert system technology provides a mechanism to manage and reason with this expanded information/data set. The material presented in this paper concerns initial studies and a resultant prototype expert system that incorporates pertinent information, and evaluation logic and decision processes, for the purpose of validating acquired waste NDA measurement assays. 6 refs., 6 figs

  19. Initial assessment of hearing loss using a mobile application for audiological evaluation.

    Science.gov (United States)

    Derin, S; Cam, O H; Beydilli, H; Acar, E; Elicora, S S; Sahan, M

    2016-03-01

    This study aimed to compare an Apple iOS mobile operating system application for audiological evaluation with conventional audiometry, and to determine its accuracy and reliability in the initial evaluation of hearing loss. The study comprised 32 patients (16 females) diagnosed with hearing loss. The patients were first evaluated with conventional audiometry and the degree of hearing loss was recorded. Then they underwent a smartphone-based hearing test and the data were compared using Cohen's kappa analysis. Patients' mean age was 53.59 ± 18.01 years (range, 19-85 years). The mobile phone audiometry results for 39 of the 64 ears were fully compatible with the conventional audiometry results. There was a statistically significant concordant relationship between the two sets of audiometry results (p Apple iPhone 5 that can measure hearing loss with reliable results.

  20. Hesitant Trapezoidal Fuzzy QUALIFLEX Method and Its Application in the Evaluation of Green Supply Chain Initiatives

    Directory of Open Access Journals (Sweden)

    Xiaolu Zhang

    2016-09-01

    Full Text Available This paper explores how to handle multiple criteria decision-making (MCDM problems in which the criteria values of alternatives take the form of comparative linguistic expressions. Firstly, the new concept of hesitant trapezoidal fuzzy numbers (HTrFNs is provided to model the semantics of the comparative linguistic expressions. Then, the operational laws and the distance measures of HTrFNs are presented. Afterwards, a useful outranking method, the hesitant trapezoidal fuzzy QUALIFLEX method, is developed to handle the MCDM problems with hierarchical structure in the environment of HTrFN. At length, the proposed method is applied to evaluating green supply chain initiatives in order to achieve sustainable economic and environmental performance, and a case study concerned with a fashion retail chain is presented to demonstrate its feasibility and applicability, also, a comparative analysis with other relevant approaches is conducted to validate the effectiveness of the proposed method.

  1. Long-term prognosis of young breast cancer patients (≤40 years) who did not receive adjuvant systemic treatment: protocol for the PARADIGM initiative cohort study.

    Science.gov (United States)

    Dackus, Gwen Mhe; Ter Hoeve, Natalie D; Opdam, Mark; Vreuls, Willem; Varga, Zsuzsanna; Koop, Esther; Willems, Stefan M; Van Deurzen, Carolien Hm; Groen, Emilie J; Cordoba, Alicia; Bart, Jos; Mooyaart, Antien L; van den Tweel, Jan G; Zolota, Vicky; Wesseling, Jelle; Sapino, Anna; Chmielik, Ewa; Ryska, Ales; Amant, Frederic; Broeks, Annegien; Kerkhoven, Ron; Stathonikos, Nikolas; Veta, Mitko; Voogd, Adri; Jozwiak, Katarzyna; Hauptmann, Michael; Hoogstraat, Marlous; Schmidt, Marjanka K; Sonke, Gabe; van der Wall, Elsken; Siesling, Sabine; van Diest, Paul J; Linn, Sabine C

    2017-11-14

    Currently used tools for breast cancer prognostication and prediction may not adequately reflect a young patient's prognosis or likely treatment benefit because they were not adequately validated in young patients. Since breast cancers diagnosed at a young age are considered prognostically unfavourable, many treatment guidelines recommend adjuvant systemic treatment for all young patients. Patients cured by locoregional treatment alone are, therefore, overtreated. Lack of prognosticators for young breast cancer patients represents an unmet medical need and has led to the initiation of the PAtients with bReAst cancer DIaGnosed preMenopausally (PARADIGM) initiative. Our aim is to reduce overtreatment of women diagnosed with breast cancer aged ≤ 40 years. All young, adjuvant systemic treatment naive breast cancer patients, who had no prior malignancy and were diagnosed between 1989 and 2000, were identified using the population based Netherlands Cancer Registry (n=3525). Archival tumour tissues were retrieved through linkage with the Dutch nationwide pathology registry. Tissue slides will be digitalised and placed on an online image database platform for clinicopathological revision by an international team of breast pathologists. Immunohistochemical subtype will be assessed using tissue microarrays. Tumour RNA will be isolated and subjected to next-generation sequencing. Differences in gene expression found between patients with a favourable and those with a less favourable prognosis will be used to establish a prognostic classifier, using the triple negative patients as proof of principle. Observational data from the Netherlands Cancer Registry and left over archival patient material are used. Therefore, the Dutch law on Research Involving Human Subjects Act (WMO) is not applicable. The PARADIGM study received a 'non-WMO' declaration from the Medical Ethics Committee of the Netherlands Cancer Institute - Antoni van Leeuwenhoek hospital, waiving individual patient

  2. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  3. The application of soccer performance testing protocols to the non-elite player.

    Science.gov (United States)

    Siegler, J; Robergs, R; Weingart, H

    2006-03-01

    The application of performance testing for the evaluation of non-elite soccer players has received little attention. The purpose of this investigation was to use tests developed for elite soccer players to evaluate performance in non-elite soccer players and compare performance test results between elite (literature) and non-elite (data) players. Thirteen male soccer players volunteered to participate. The tests included a treadmill VO2max test, 20 m sprint, vertical jump (VJ), 30 s Wingate cycle ergometer test, the Loughborough Intermittent Shuttle Test (LIST), and 2 20-m multi-stage shuttle runs to exhaustion (fatigue test). Actual VO2max (absolute and relative) scores were correlated with the estimated VO2max scores (fatigue test), 20 m sprint, VJ, and 30 s Wingate using a Pearson's product-moment correlation. A paired t-test was conducted on the fatigue test trials. Non-significant relationships were observed between actual VO2max scores and estimated VO2max from the fatigue test (absolute and relative terms). Non-significant relationships were also observed between peak and average power output (Wingate), 20 m sprint, and VJ. Mean heart rates (HRs) throughout the LIST was 165+/-7 bpm, which represented 88% of HRmax. The results of this study demonstrate that to elicit physiological differences between elite and non-elite players, assessment must include both an aerobic and anaerobic component.

  4. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  5. Licensing requirements for initial commissioning programs in Spain: Application to different PWR designs

    International Nuclear Information System (INIS)

    Munuera, A.; Conde, J.M.; Martinez, J.

    1991-01-01

    This paper describes the overall licensing process in Spain, focusing on the initial commissioning requirements. The significance of this part of the regulatory work is evident both from the licensing and the licensee's points of view. Licensing in Spain is ruled by different laws which determine the general requirements and fix the licensing frame. Being a nuclear technology importer country, the base of the regulatory work lies on the rules and regulations of the country of origin of the planet, with the addition of case specific requirements. The application of this methodology to plants designed in different countries produces licensing processes which are similar to the overall, but very different in its development. It also means a special technical effort on the part of the regulatory body to cope with the problems arising from the use of different technologies and safety standards. The start-up programs from fuel loading to full power of a Westinghouse plant (Vandellos 2) and a Siemens-KWU plant (Trillo 1) are compared from the technical point of view, enhancing the differences that can be relevant for the regulatory work. The difficulties arising from the application of both the German and US concepts are discussed. (orig.)

  6. Volunteer trials of a novel improvised dry decontamination protocol for use during mass casualty incidents as part of the UK'S Initial Operational Response (IOR.

    Directory of Open Access Journals (Sweden)

    Richard Amlôt

    Full Text Available Previous studies have demonstrated that rapid evacuation, disrobing and emergency decontamination can enhance the ability of emergency services and acute hospitals to effectively manage chemically-contaminated casualties. The purpose of this human volunteer study was to further optimise such an "Initial Operational Response" by (1 identifying an appropriate method for performing improvised skin decontamination and (2 providing guidance for use by first responders and casualties. The study was performed using two readily available, absorbent materials (paper towels and incontinence pads. The decontamination effectiveness of the test materials was measured by quantifying the amount of a chemical warfare agent simulant (methyl salicylate removed from each volunteer's forearm skin. Results from the first study demonstrated that simulant recovery was lower in all of the dry decontamination conditions when compared to matched controls, suggesting that dry decontamination serves to reduce chemical exposure. Blotting in combination with rubbing was the most effective form of decontamination. There was no difference in effectiveness between the two absorbent materials. In the following study, volunteers performed improvised dry decontamination, either with or without draft guidelines. Volunteers who received the guidance were able to carry out improvised dry decontamination more effectively, using more of the absorbent product (blue roll to ensure that all areas of the body were decontaminated and avoiding cross-contamination of other body areas by working systematically from the head downwards. Collectively, these two studies suggest that absorbent products that are available on ambulances and in acute healthcare settings may have generic applicability for improvised dry decontamination. Wherever possible, emergency responders and healthcare workers should guide casualties through decontamination steps; in the absence of explicit guidance and

  7. Volunteer trials of a novel improvised dry decontamination protocol for use during mass casualty incidents as part of the UK'S Initial Operational Response (IOR).

    Science.gov (United States)

    Amlôt, Richard; Carter, Holly; Riddle, Lorna; Larner, Joanne; Chilcott, Robert P

    2017-01-01

    Previous studies have demonstrated that rapid evacuation, disrobing and emergency decontamination can enhance the ability of emergency services and acute hospitals to effectively manage chemically-contaminated casualties. The purpose of this human volunteer study was to further optimise such an "Initial Operational Response" by (1) identifying an appropriate method for performing improvised skin decontamination and (2) providing guidance for use by first responders and casualties. The study was performed using two readily available, absorbent materials (paper towels and incontinence pads). The decontamination effectiveness of the test materials was measured by quantifying the amount of a chemical warfare agent simulant (methyl salicylate) removed from each volunteer's forearm skin. Results from the first study demonstrated that simulant recovery was lower in all of the dry decontamination conditions when compared to matched controls, suggesting that dry decontamination serves to reduce chemical exposure. Blotting in combination with rubbing was the most effective form of decontamination. There was no difference in effectiveness between the two absorbent materials. In the following study, volunteers performed improvised dry decontamination, either with or without draft guidelines. Volunteers who received the guidance were able to carry out improvised dry decontamination more effectively, using more of the absorbent product (blue roll) to ensure that all areas of the body were decontaminated and avoiding cross-contamination of other body areas by working systematically from the head downwards. Collectively, these two studies suggest that absorbent products that are available on ambulances and in acute healthcare settings may have generic applicability for improvised dry decontamination. Wherever possible, emergency responders and healthcare workers should guide casualties through decontamination steps; in the absence of explicit guidance and instructions, improvised

  8. Volunteer trials of a novel improvised dry decontamination protocol for use during mass casualty incidents as part of the UK’S Initial Operational Response (IOR)

    Science.gov (United States)

    Riddle, Lorna; Larner, Joanne

    2017-01-01

    Previous studies have demonstrated that rapid evacuation, disrobing and emergency decontamination can enhance the ability of emergency services and acute hospitals to effectively manage chemically-contaminated casualties. The purpose of this human volunteer study was to further optimise such an “Initial Operational Response” by (1) identifying an appropriate method for performing improvised skin decontamination and (2) providing guidance for use by first responders and casualties. The study was performed using two readily available, absorbent materials (paper towels and incontinence pads). The decontamination effectiveness of the test materials was measured by quantifying the amount of a chemical warfare agent simulant (methyl salicylate) removed from each volunteer’s forearm skin. Results from the first study demonstrated that simulant recovery was lower in all of the dry decontamination conditions when compared to matched controls, suggesting that dry decontamination serves to reduce chemical exposure. Blotting in combination with rubbing was the most effective form of decontamination. There was no difference in effectiveness between the two absorbent materials. In the following study, volunteers performed improvised dry decontamination, either with or without draft guidelines. Volunteers who received the guidance were able to carry out improvised dry decontamination more effectively, using more of the absorbent product (blue roll) to ensure that all areas of the body were decontaminated and avoiding cross-contamination of other body areas by working systematically from the head downwards. Collectively, these two studies suggest that absorbent products that are available on ambulances and in acute healthcare settings may have generic applicability for improvised dry decontamination. Wherever possible, emergency responders and healthcare workers should guide casualties through decontamination steps; in the absence of explicit guidance and instructions

  9. Sugarcane Initial Growth with Vinasse Application in Latosol under Gradual Aluminum Stress

    Science.gov (United States)

    Marques Viglio, Larissa; Leal Varanda, Leticia; Soares, Marcio Roberto; Casagrande, José Carlos

    2015-04-01

    One of the strategies for overcoming the high acidity of soils and the consequent toxicity of aluminum (Al) is based on the use of varieties adapted to these conditions. In Brazil, the application of vinasse is routine practice in the cultivation of sugarcane due to its fertilizing effect, mainly because of high potassium content. However, the vinasse may also attenuate the toxic effects of Al in the soil by forming complexes with low molecular weight organic acids providing greater depth of the root of sugarcane. The aim of this work was to evaluate the effect of vinasse on the initial growth of three cultivars of sugarcane (RB855453, RB966928 and RB867515), as well as its influence on root depth in a Dystrophic Red-Yellow Latosol (Typic Hapludox) with gradient of saturation by Al. The experiment was conducted in a greenhouse, in totally randomized design with factorial arrangement and three replications. Seedlings of sugarcane were transplanted to PVC columns 0.8 m high, built by stacking four rings (0.2 m high), filled with soil samples, which offered an increasing gradient of saturation by Al (m%) at depth (0-0.2 m (m% = 0,7); 0.2-0.4 m (m% = 7,9); 0.4-0.6 m (m %= 40.8); 0.6-0.8 m (m%= 62.6)). The collection of the experiment was conducted 120 days after planting, with the determination of the stalk diameter (DC), plant height (ALT), leaf nutrient content, dry matter of the aerial part (MSPA) and dry matter of the root system (MSSR). Cultivars of sugarcane and the application of vinasse had effect on DC and the MSSR. Cultivar RB867515 showed higher DC than in other cultivars, with 20.8 mm. The increase of MSSR by sugarcane cultivars varied due to depth. There were no effects of sugarcane cultivars and vinasse application in MSPA. The vinasse application resulted in plants with higher ALT. With the exception of the foliar content of Fe, the N, Ca, Mg, S and Mn content were below those considered appropriate for sugarcane. Unlike other cultivars, the application

  10. The Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) - Application in Early Warning Systems for Natural Hazard

    Science.gov (United States)

    Lendholt, Matthias; Hammitzsch, Martin; Wächter, Joachim

    2010-05-01

    The Common Alerting Protocol (CAP) [1] is an XML-based data format for exchanging public warnings and emergencies between alerting technologies. In conjunction with the Emergency Data Exchange Language (EDXL) Distribution Element (-DE) [2] these data formats can be used for warning message dissemination in early warning systems for natural hazards. Application took place in the DEWS (Distance Early Warning System) [3] project where CAP serves as central message format containing both human readable warnings and structured data for automatic processing by message receivers. In particular the spatial reference capabilities are of paramount importance both in CAP and EDXL. Affected areas are addressable via geo codes like HASC (Hierarchical Administrative Subdivision Codes) [4] or UN/LOCODE [5] but also with arbitrary polygons that can be directly generated out of GML [6]. For each affected area standardized criticality values (urgency, severity and certainty) have to be set but also application specific key-value-pairs like estimated time of arrival or maximum inundation height can be specified. This enables - together with multilingualism, message aggregation and message conversion for different dissemination channels - the generation of user-specific tailored warning messages. [1] CAP, http://www.oasis-emergency.org/cap [2] EDXL-DE, http://docs.oasis-open.org/emergency/edxl-de/v1.0/EDXL-DE_Spec_v1.0.pdf [3] DEWS, http://www.dews-online.org [4] HASC, "Administrative Subdivisions of Countries: A Comprehensive World Reference, 1900 Through 1998" ISBN 0-7864-0729-8 [5] UN/LOCODE, http://www.unece.org/cefact/codesfortrade/codes_index.htm [6] GML, http://www.opengeospatial.org/standards/gml

  11. Application of the Intervention Mapping protocol to develop Keys, a family child care home intervention to prevent early childhood obesity.

    Science.gov (United States)

    Mann, Courtney M; Ward, Dianne S; Vaughn, Amber; Benjamin Neelon, Sara E; Long Vidal, Lenita J; Omar, Sakinah; Namenek Brouwer, Rebecca J; Østbye, Truls

    2015-12-10

    Many families rely on child care outside the home, making these settings important influences on child development. Nearly 1.5 million children in the U.S. spend time in family child care homes (FCCHs), where providers care for children in their own residences. There is some evidence that children in FCCHs are heavier than those cared for in centers. However, few interventions have targeted FCCHs for obesity prevention. This paper will describe the application of the Intervention Mapping (IM) framework to the development of a childhood obesity prevention intervention for FCCHs Following the IM protocol, six steps were completed in the planning and development of an intervention targeting FCCHs: needs assessment, formulation of change objectives matrices, selection of theory-based methods and strategies, creation of intervention components and materials, adoption and implementation planning, and evaluation planning Application of the IM process resulted in the creation of the Keys to Healthy Family Child Care Homes program (Keys), which includes three modules: Healthy You, Healthy Home, and Healthy Business. Delivery of each module includes a workshop, educational binder and tool-kit resources, and four coaching contacts. Social Cognitive Theory and Self-Determination Theory helped guide development of change objective matrices, selection of behavior change strategies, and identification of outcome measures. The Keys program is currently being evaluated through a cluster-randomized controlled trial The IM process, while time-consuming, enabled rigorous and systematic development of intervention components that are directly tied to behavior change theory and may increase the potential for behavior change within the FCCHs.

  12. Global Land Product Validation Protocols: An Initiative of the CEOS Working Group on Calibration and Validation to Evaluate Satellite-derived Essential Climate Variables

    Science.gov (United States)

    Guillevic, P. C.; Nickeson, J. E.; Roman, M. O.; camacho De Coca, F.; Wang, Z.; Schaepman-Strub, G.

    2016-12-01

    The Global Climate Observing System (GCOS) has specified the need to systematically produce and validate Essential Climate Variables (ECVs). The Committee on Earth Observation Satellites (CEOS) Working Group on Calibration and Validation (WGCV) and in particular its subgroup on Land Product Validation (LPV) is playing a key coordination role leveraging the international expertise required to address actions related to the validation of global land ECVs. The primary objective of the LPV subgroup is to set standards for validation methods and reporting in order to provide traceable and reliable uncertainty estimates for scientists and stakeholders. The Subgroup is comprised of 9 focus areas that encompass 10 land surface variables. The activities of each focus area are coordinated by two international co-leads and currently include leaf area index (LAI) and fraction of absorbed photosynthetically active radiation (FAPAR), vegetation phenology, surface albedo, fire disturbance, snow cover, land cover and land use change, soil moisture, land surface temperature (LST) and emissivity. Recent additions to the focus areas include vegetation indices and biomass. The development of best practice validation protocols is a core activity of CEOS LPV with the objective to standardize the evaluation of land surface products. LPV has identified four validation levels corresponding to increasing spatial and temporal representativeness of reference samples used to perform validation. Best practice validation protocols (1) provide the definition of variables, ancillary information and uncertainty metrics, (2) describe available data sources and methods to establish reference validation datasets with SI traceability, and (3) describe evaluation methods and reporting. An overview on validation best practice components will be presented based on the LAI and LST protocol efforts to date.

  13. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition); Guide d'application des garanties pour les Etats ayant des protocoles relatifs aux petites quantites de matieres

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-10-15

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  14. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  15. The Text of a Protocol between the Agency and the Governments of Thailand and the United States of America Terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and Terminating the Protocol Suspending that Agreement

    International Nuclear Information System (INIS)

    1976-01-01

    The text of a protocol between the Agency and the Governments of Thailand and the United States of America terminating the Agreement between the International Atomic Energy Agency, the Government of the Kingdom of Thailand and the Government of the United States of America for the Application of Safeguards and terminating the Protocol suspending that Agreement is reproduced in this document for the information of all Members. The Protocol entered into force on 27 June 1974, pursuant to Section 6 thereof.

  16. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  17. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  18. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  19. Initial growth of maize in response to application of rock phosphate, vermicompost and endophytic bacteria

    Directory of Open Access Journals (Sweden)

    Lílian Estrela Borges Baldotto

    2012-04-01

    Full Text Available Due to the high energy requirement and demand for non-renewable resources for the production of chemical fertilizers, added also to the environmental impact caused by the use of such products, it is important to intensify research on bio-based agricultural inputs. The use of nitrogen-fixing endophytic and phosphate solubilizing bacteria can provide these nutrients to the plants from the air and poorly soluble phosphorus sources, such as phosphate rock. The objective of this study was to evaluate the nutrition and initial growth of maize (Zea mays L. in response to the inoculation of nitrogen-fixing and rock phosphate solubilizing endophytic bacteria, in single or mixed formulation, applied with vermicompost. The treatments containing bacteria, both diazotrophic and phosphate solubilizing, when compared to controls, showed higher levels of leaf nitrogen and phosphorus in maize, as well as higher growth characteristics. The application of vermicompost showed synergistic effect when combined with endophytic bacteria. Thus, the innovation of the combination of the studied factors may contribute to the early development of maize.

  20. Application of micromechanical models of ductile fracture initiation to reactor pressure vessel materials

    International Nuclear Information System (INIS)

    Chaouadi, R.; Walle, E. van; Fabry, A.; Velde, J. van de; Meester, P. de

    1996-01-01

    The aim of the current study is the application of local micromechanical models to predict crack initiation in ductile materials. Two reactor pressure vessel materials have been selected for this study: JRQ IAEA monitor base metal (A533B Cl.1) and Doel-IV weld material. Charpy impact tests have been performed in both un-irradiated and irradiated conditions. In addition to standard tensile tests, notched tensile specimens have been tested. The upper shelf energy of the weld material remains almost un-affected by irradiation, whereas a decrease of 20% is detected for the base metal. Accordingly, the tensile properties of the weld material do not reveal a clear irradiation effect on the yield and ultimate stresses, this in contrast to the base material flow properties. The tensile tests have been analyzed in terms of micromechanical models. A good correlation is found between the standard tests and the micromechanical models, that are able to predict the ductile damage evolution in these materials. Additional information on the ductility behavior of these materials is revealed by this micromechanical analysis

  1. Virtual Reality Transfer Protocol (VRTP): Implementing a Monitor Application for the Real-Time Transport Protocol (RTP) Using the JAVA Media Framework (JMF)

    Science.gov (United States)

    1999-09-01

    application, a complete specification will require one or more companion documents, as follows. 1. Profile Specification Documents A Profile...Rio de Janeiro - RJ - Brazil 21. Diretoria de Sistemas de Armas da Marinha Rua Primeiro de Marco, 118 Rio de Janeiro - RJ - Brazil CEP 20010 22

  2. Predicting the Initial Lapse Using a Mobile Health Application after Alcohol Detoxification

    Science.gov (United States)

    Chih, Ming-Yuan

    2013-01-01

    The prediction and prevention of the initial lapse--which is defined as the first lapse after a period of abstinence--is important because the initial lapse often leads to subsequent lapses (within the same lapse episode) or relapse. The prediction of the initial lapse may allow preemptive intervention to be possible. This dissertation reports on…

  3. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-02-09

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997.

  4. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  5. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    Science.gov (United States)

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  6. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Science.gov (United States)

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  7. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Directory of Open Access Journals (Sweden)

    Dixys L. Hernández-Rojas

    2017-12-01

    Full Text Available The Internet of Things (IoT involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons, LP4S-X (for more powerful beacons and LP4S-J (for beacons able to run complex firmware. In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6 is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format. Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  8. Assessment of a robust model protocol with accelerated throughput for a human recombinant full length estrogen receptor-alpha binding assay: protocol optimization and intralaboratory assay performance as initial steps towards validation.

    Science.gov (United States)

    Freyberger, Alexius; Wilson, Vickie; Weimer, Marc; Tan, Shirlee; Tran, Hoai-Son; Ahr, Hans-Jürgen

    2010-08-01

    Despite about two decades of research in the field of endocrine active compounds, still no validated human recombinant (hr) estrogen receptor-alpha (ERalpha) binding assay is available, although hr-ERalpha is available from several sources. In a joint effort, US EPA and Bayer Schering Pharma with funding from the EU-sponsored 6th framework project, ReProTect, developed a model protocol for such a binding assay. Important features of this assay are the use of a full length hr-ERalpha and performance in a 96-well plate format. A full length hr-ERalpha was chosen, as it was considered to provide the most accurate and human-relevant results, whereas truncated receptors could perform differently. Besides three reference compounds [17beta-estradiol, norethynodrel, dibutylphthalate] nine test compounds with different affinities for the ERalpha [diethylstilbestrol (DES), ethynylestradiol, meso-hexestrol, equol, genistein, o,p'-DDT, nonylphenol, n-butylparaben, and corticosterone] were used to explore the performance of the assay. Three independent experiments per compound were performed on different days, and dilutions of test compounds from deep-frozen stocks, solutions of radiolabeled ligand and receptor preparation were freshly prepared for each experiment. The ERalpha binding properties of reference and test compounds were well detected. As expected dibutylphthalate and corticosterone were non-binders in this assay. In terms of the relative ranking of binding affinities, there was good agreement with published data obtained from experiments using a human recombinant ERalpha ligand binding domain. Irrespective of the chemical nature of the compound, individual IC(50)-values for a given compound varied by not more than a factor of 2.5. Our data demonstrate that the assay was robust and reliably ranked compounds with strong, weak, and no affinity for the ERalpha with high accuracy. It avoids the manipulation and use of animals, i.e., the preparation of uterine cytosol as

  9. The effect of different fluoride application methods on the remineralization of initial carious lesions.

    Science.gov (United States)

    Byeon, Seon Mi; Lee, Min Ho; Bae, Tae Sung

    2016-05-01

    The purpose of this study was to assess the effect of single and combined applications of fluoride on the amount of fluoride release, and the remineralization and physical properties of enamel. Each of four fluoride varnish and gel products (Fluor Protector, FP, Ivoclar Vivadent; Tooth Mousse Plus, TM, GC; 60 Second Gel, A, Germiphene; CavityShield, CS, 3M ESPE) and two fluoride solutions (2% sodium fluoride, N; 8% tin(ii) fluoride, S) were applied on bovine teeth using single and combined methods (10 per group), and then the amount of fluoride release was measured for 4 wk. The electron probe microanalysis and the Vickers microhardness measurements were conducted to assess the effect of fluoride application on the surface properties of bovine teeth. The amount of fluoride release was higher in combined applications than in single application (p < 0.05). Microhardness values were higher after combined applications of N with FP, TM, and CS than single application of them, and these values were also higher after combined applications of S than single application of A (p < 0.05). Ca and P values were higher in combined applications of N with TM and CS than single application of them (p < 0.05). They were also increased after combined applications of the S with A than after single application (p < 0.05). Combined applications of fluoride could be used as a basis to design more effective methods of fluoride application to provide enhanced remineralization.

  10. Simplified clinical algorithm for identifying patients eligible for immediate initiation of antiretroviral therapy for HIV (SLATE): protocol for a randomised evaluation.

    Science.gov (United States)

    Rosen, Sydney; Fox, Matthew P; Larson, Bruce A; Brennan, Alana T; Maskew, Mhairi; Tsikhutsu, Isaac; Bii, Margaret; Ehrenkranz, Peter D; Venter, Wd Francois

    2017-05-28

    African countries are rapidly adopting guidelines to offer antiretroviral therapy (ART) to all HIV-infected individuals, regardless of CD4 count. For this policy of 'treat all' to succeed, millions of new patients must be initiated on ART as efficiently as possible. Studies have documented high losses of treatment-eligible patients from care before they receive their first dose of antiretrovirals (ARVs), due in part to a cumbersome, resource-intensive process for treatment initiation, requiring multiple clinic visits over a several-week period. The Simplified Algorithm for Treatment Eligibility (SLATE) study is an individually randomised evaluation of a simplified clinical algorithm for clinicians to reliably determine a patient's eligibility for immediate ART initiation without waiting for laboratory results or additional clinic visits. SLATE will enrol and randomise (1:1) 960 adult, HIV-positive patients who present for HIV testing or care and are not yet on ART in South Africa and Kenya. Patients randomised to the standard arm will receive routine, standard of care ART initiation from clinic staff. Patients randomised to the intervention arm will be administered a symptom report, medical history, brief physical exam and readiness assessment. Patients who have positive (satisfactory) results for all four components of SLATE will be dispensed ARVs immediately, at the same clinic visit. Patients who have any negative results will be referred for further clinical investigation, counselling, tests or other services prior to being dispensed ARVs. After the initial visit, follow-up will be by passive medical record review. The primary outcomes will be ART initiation ≤28 days and retention in care 8 months after study enrolment. Ethics approval has been provided by the Boston University Institutional Review Board, the University of the Witwatersrand Human Research Ethics Committee (Medical) and the KEMRI Scientific and Ethics Review Unit. Results will be published in

  11. Application of model of incremental haemodialysis, based on residual renal function, at the initiation of renal replacement therapy

    Directory of Open Access Journals (Sweden)

    José L. Merino

    2017-01-01

    Conclusions: Incremental HD treatment, with twice-weekly HD, may be an alternative in selected patients. This approach can largely preserve residual renal function at least for the first year. Although this pattern probably is not applicable to all patients starting RRT, it can and should be an initial alternative to consider.

  12. National Audubon society's technology initiatives for bird conservation: a summary of application development for the Christmas bird count

    Science.gov (United States)

    Kathy Dale

    2005-01-01

    Since 1998, Audubon's Christmas Bird Count (CBC) has been supported by an Internet-based data entry application that was initially designed to accommodate the traditional paper-based methods of this long-running bird monitoring program. The first efforts to computerize the data and the entry procedures have informed a planned strategy to revise the current...

  13. 78 FR 57857 - Medicare and Medicaid Programs; Application from the Compliance Team for Initial CMS-Approval of...

    Science.gov (United States)

    2013-09-20

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services [CMS-3287-PN] Medicare and Medicaid Programs; Application from the Compliance Team for Initial CMS-Approval of its Rural Health Clinic Accreditation Program AGENCY: Centers for Medicare and Medicaid Services, HHS. ACTION...

  14. Simplified clinical algorithm for identifying patients eligible for immediate initiation of antiretroviral therapy for HIV (SLATE): protocol for a randomised evaluation

    OpenAIRE

    Rosen, Sydney; Fox, Matthew P; Larson, Bruce A; Brennan, Alana T; Maskew, Mhairi; Tsikhutsu, Isaac; Bii, Margaret; Ehrenkranz, Peter D; Venter, WD Francois

    2017-01-01

    Introduction African countries are rapidly adopting guidelines to offer antiretroviral therapy (ART) to all HIV-infected individuals, regardless of CD4 count. For this policy of ‘treat all’ to succeed, millions of new patients must be initiated on ART as efficiently as possible. Studies have documented high losses of treatment-eligible patients from care before they receive their first dose of antiretrovirals (ARVs), due in part to a cumbersome, resource-intensive process for treatment initia...

  15. A national evaluation of a dissemination and implementation initiative to enhance primary care practice capacity and improve cardiovascular disease care: the ESCALATES study protocol

    OpenAIRE

    Cohen, Deborah J.; Balasubramanian, Bijal A.; Gordon, Leah; Marino, Miguel; Ono, Sarah; Solberg, Leif I.; Crabtree, Benjamin F.; Stange, Kurt C.; Davis, Melinda; Miller, William L.; Damschroder, Laura J.; McConnell, K. John; Creswell, John

    2016-01-01

    Background The Agency for Healthcare Research and Quality (AHRQ) launched the EvidenceNOW Initiative to rapidly disseminate and implement evidence-based cardiovascular disease (CVD) preventive care in smaller primary care practices. AHRQ funded eight grantees (seven regional Cooperatives and one independent national evaluation) to participate in EvidenceNOW. The national evaluation examines quality improvement efforts and outcomes for more than 1500 small primary care practices (restricted to...

  16. 47 CFR Appendix B to Part 400 - Initial Certification for E-911 Grant Applicants

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Initial Certification for E-911 Grant... ADMINISTRATION, DEPARTMENT OF COMMERCE, AND NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION E-911 GRANT PROGRAM Pt. 400, App. B Appendix B to Part 400—Initial Certification for E-911 Grant...

  17. 76 FR 23583 - Application of the Energy Planning and Management Program Power Marketing Initiative to the...

    Science.gov (United States)

    2011-04-27

    ... Management Program Power Marketing Initiative to the Boulder Canyon Project AGENCY: Western Area Power... Area Power Administration (Western), a Federal power marketing agency of the Department of Energy (DOE), will apply the Energy Planning and Management Program (Program) Power Marketing Initiative (PMI), as...

  18. Least squares approach for initial data recovery in dynamic data-driven applications simulations

    KAUST Repository

    Douglas, C.; Efendiev, Y.; Ewing, R.; Ginting, V.; Lazarov, R.; Cole, M.; Jones, G.

    2010-01-01

    In this paper, we consider the initial data recovery and the solution update based on the local measured data that are acquired during simulations. Each time new data is obtained, the initial condition, which is a representation of the solution at a

  19. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  20. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  1. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [es

  2. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003.

  3. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003.

  4. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  5. Protocol Additional to the agreement between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 13 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of South Africa and the Agency, i.e. on 13 September 2002

  6. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  7. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-05-04

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001.

  8. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-03-28

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001.

  9. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  10. Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non‑Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 16 April 2014 in Basseterre, Saint Kitts and Nevis, and on 19 May 2014 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 May 2014, upon signature by the representatives of Saint Kitts and Nevis and the Agency

  11. Protocol Additional to the Agreement Between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed in Vienna on 27 September 2007. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 27 September 2007, upon signature by the representatives of Burundi and the Agency

  12. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 22 March 2013, upon signature by the representatives of the Denmark and the Agency.

  13. Protocol additional to the agreement between the Republic of Mali and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Mali and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 12 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Mali and the Agency, i.e. on 12 September 2002

  14. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [fr

  15. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003

  16. Protocol Additional to the agreement between the Republic of Palau and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Palau and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 10 May 2005 in New York and 13 May 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 13 May 2005, upon signature by the representatives of Palau and the Agency

  17. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  18. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  19. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2001-01-01

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  20. Protocol Additional to the agreement between the Republic of Colombia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Colombia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 25 November 2004. It was signed in Vienna on 11 May 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 5 March 2009, the date on which the Agency received from Colombia written notification that Colombia's statutory and constitutional requirements for entry into force had been met

  1. The influence of contextual factors on healthcare quality improvement initiatives: what works, for whom and in what setting? Protocol for a realist review.

    Science.gov (United States)

    Coles, Emma; Wells, Mary; Maxwell, Margaret; Harris, Fiona M; Anderson, Julie; Gray, Nicola M; Milner, Gill; MacGillivray, Stephen

    2017-08-23

    Context shapes the effectiveness of knowledge implementation and influences health improvement. Successful healthcare quality improvement (QI) initiatives frequently fail to transfer to different settings, with local contextual factors often cited as the cause. Understanding and overcoming contextual barriers is therefore crucial to implementing effective improvement; yet context is still poorly understood. There is a paucity of information on the mechanisms underlying how and why QI projects succeed or fail in given settings. A realist review of empirical studies of healthcare QI initiatives will be undertaken to examine the influence and impact of contextual factors on quality improvement in healthcare settings and explore whether QI initiatives can work in all contexts. The review will explore which contextual factors are important, and how, why, when and for whom they are important, within varied settings. The dynamic nature of context and change over time will be explored by examining which aspects of context impact at key points in the improvement trajectory. The review will also consider the influence of context on improvement outcomes (provider- and patient-level), spread and sustainability. The review process will follow five iterative steps: (1) clarify scope, (2) search for evidence, (3) appraise primary studies and extract data, (4) synthesise evidence and draw conclusions and (5) disseminate findings. The reviewers will consult with experts and stakeholders in the early stages to focus the review and develop a programme theory consisting of explanatory 'context-mechanism-outcome' configurations. Searches for primary evidence will be conducted iteratively. Data will be extracted and tested against the programme theory. A review advisory group will oversee the review process. Review findings will follow RAMESES guidelines and will be disseminated via a report, presentations and peer-reviewed publications. The review will update and consolidate evidence

  2. A bespoke mobile application for the longitudinal assessment of depression and mood during pregnancy: protocol of a feasibility study.

    Science.gov (United States)

    Marcano Belisario, Jose Salvador; Doherty, Kevin; O'Donoghue, John; Ramchandani, Paul; Majeed, Azeem; Doherty, Gavin; Morrison, Cecily; Car, Josip

    2017-05-29

    Depression is a common mental health disorder during pregnancy, with important consequences for mothers and their children. Despite this, it goes undiagnosed and untreated in many women attending antenatal care. Smartphones could help support the prompt identification of antenatal depression in this setting. In addition, these devices enable the implementation of ecological momentary assessment techniques, which could be used to assess how mood is experienced during pregnancy. With this study, we will assess the feasibility of using a bespoke mobile application (app) running on participants' own handsets for the longitudinal (6 months) monitoring of antenatal mood and screening of depression. We will use a randomised controlled study design to compare two types of assessment strategies: retrospective + momentary (consisting of the Edinburgh Postnatal Depression Scale plus five momentary and two contextual questions), and retrospective (consisting of the Edinburgh Postnatal Depression Scale only). We will assess the impact that these strategies have on participant adherence to a prespecified sampling protocol, dropout rates and timeliness of data completion. We will evaluate differences in acceptance of the technology through a short quantitative survey and open-ended questions. We will also assess the potential effect that momentary assessments could have on retrospective data. We will attempt to identify any patterns in app usage through the analysis of log data. This study has been reviewed and approved by the National Research Ethics Service Committee South East Coast-Surrey on 15 April 2016 as a notice of substantial amendment to the original submission (9 July 2015) under the Research Ethics Committee (REC) reference 15/LO/0977. This study is being sponsored by Imperial College London under the reference number 15IC2687 and has been included in the UK Clinical Research Network Study Portfolio under the Central Portfolio Management System number 19280. The

  3. Initial Evaluation of a Mobile Scaffolding Application That Seeks to Support Novice Learners of Programming

    Science.gov (United States)

    Mbogo, Chao; Blake, Edwin; Suleman, Hussein

    2014-01-01

    The aim of this paper is to explore the use of an application that scaffolds the constructions of programs on a mobile device. The application was developed to support novice learners of programming outside the classroom. This paper reports on results of a first experiment conducted to evaluate the mobile application. The main research questions…

  4. Protocol for Validation of the Land Surface Reflectance Fundamental Climate Data Record using AERONET: Application to the Global MODIS and VIIRS Data Records

    Science.gov (United States)

    Roger, J. C.; Vermote, E.; Holben, B. N.

    2014-12-01

    The land surface reflectance is a fundamental climate data record at the basis of the derivation of other climate data records (Albedo, LAI/Fpar, Vegetation indices) and a key parameter in the understanding of the land-surface-climate processes. It is essential that a careful validation of its uncertainties is performed on a global and continuous basis. One approach is the direct comparison of this product with ground measurements but that approach presents several issues related to scale, the episodic nature of ground measurements and the global representativeness. An alternative is to compare the surface reflectance product to reference reflectance determined from Top of atmosphere reflectance corrected using accurate radiative transfer code and very detailed measurements of the atmosphere obtained over the AERONET sites (Vermote and al, 2014, RSE) which allows to test for a large range of aerosol characteristics; formers being important inputs for atmospheric corrections. However, the application of this method necessitates the definition of a very detailed protocol for the use of AERONET data especially as far as size distribution and absorption are concerned, so that alternative validation methods or protocols could be compared. This paper describes the protocol we have been working on based on our experience with the AERONET data and its application to the MODIS and VIIRS record.

  5. A bridge between two conventions on civil liability for nuclear damage: The Joint Protocol relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    Busekist, Otto von

    2006-01-01

    The adoption of the Joint Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and the NEA, was hailed as landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. The present article attempts to describe the history of the Joint Protocol during the many years it took to develop this link between the two conventions, to provide comment on its objectives and content, and to discuss some important questions related to its application

  6. A bridge between two Conventions on civil liability for nuclear damage: the Joint protocol Relating to the application of the Vienna Convention and the Paris Convention

    International Nuclear Information System (INIS)

    Busekist, O. von.

    1989-01-01

    The adoption of the Joint-Protocol and its signature on 21 September 1988, at the closure of the diplomatic conference jointly convened in Vienna by the IAEA and NEA, was hailed as a landmark in efforts towards the establishment of a comprehensive civil nuclear liability regime. The importance of liability and compensation for transfrontier damage caused by a nuclear incident is indeed one of the lessons learned from the Chernobyl accident. This article describes the history of the Joint Protocol during the many years it took to develop this link between the two Conventions, provides a comment on its objectives and content, and discusses some important questions related to its application. (NEA) [fr

  7. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  8. Clinical applicability and cutoff values for an unstructured neuropsychological assessment protocol for older adults with low formal education.

    Science.gov (United States)

    de Paula, Jonas Jardim; Bertola, Laiss; Ávila, Rafaela Teixeira; Moreira, Lafaiete; Coutinho, Gabriel; de Moraes, Edgar Nunes; Bicalho, Maria Aparecida Camargos; Nicolato, Rodrigo; Diniz, Breno Satler; Malloy-Diniz, Leandro Fernandes

    2013-01-01

    The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease) with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education.

  9. Development of an eco-protocol for seaweed chlorophylls extraction and possible applications in dye sensitized solar cells

    International Nuclear Information System (INIS)

    Armeli Minicante, S; Ambrosi, E; Back, M; Barichello, J; Cattaruzza, E; Gonella, F; Scantamburlo, E; Trave, E

    2016-01-01

    Seaweeds are a reserve of natural dyes (chlorophylls a , b and c ), characterized by low cost and easy supply, without potential environmental load in terms of land subtraction, and also complying with the requirements of an efficient waste management policy. In particular, the brown seaweed Undaria pinnatifida is a species largely present in the Venice Lagoon area, and for it a removal strategy is actually mandatory. In this paper, we set-up an eco-protocol for the best extraction and preparation procedures of the pigment, with the aim of finding an easy and affordable method for chlorophyll c extraction, exploring at the same time the possibility of using these algae within local sustainable management integrated strategies, among which the possible use of chlorophylls as a dye source in dye sensitized solar cells (DSSCs) is investigated. Experimental results suggest that the developed protocols are useful to optimize the chlorophyll c extraction, as shown by optical absorption spectroscopy measurements. The DSSCs built with the chlorophyll extracted by the proposed eco-protocol exhibit solar energy conversion efficiencies are similar to those obtained following extraction protocols with larger environmental impacts. (paper)

  10. Least squares approach for initial data recovery in dynamic data-driven applications simulations

    KAUST Repository

    Douglas, C.

    2010-12-01

    In this paper, we consider the initial data recovery and the solution update based on the local measured data that are acquired during simulations. Each time new data is obtained, the initial condition, which is a representation of the solution at a previous time step, is updated. The update is performed using the least squares approach. The objective function is set up based on both a measurement error as well as a penalization term that depends on the prior knowledge about the solution at previous time steps (or initial data). Various numerical examples are considered, where the penalization term is varied during the simulations. Numerical examples demonstrate that the predictions are more accurate if the initial data are updated during the simulations. © Springer-Verlag 2011.

  11. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  12. Protocol for a feasibility trial for improving breast feeding initiation and continuation: assets-based infant feeding help before and after birth (ABA)

    Science.gov (United States)

    Jolly, Kate; Ingram, Jenny; Clarke, Joanne; Johnson, Debbie; Trickey, Heather; Thomson, Gill; Dombrowski, Stephan U; Sitch, Alice; Dykes, Fiona; Feltham, Max G; Darwent, Kirsty; MacArthur, Christine; Roberts, Tracy

    2018-01-01

    intervention fidelity. Ethics and dissemination Study results will inform the design of a larger multicentre RCT. The National Research Ethics Service Committee approved the study protocol. Trial registration number ISRCTN14760978; Pre-results. PMID:29362263

  13. Study on synthesis, application and mechanism of benzophenone/amine initiator

    International Nuclear Information System (INIS)

    Xiong Wei; Liu Jinshui; Wen Yinjun; Wan Qizhong; Zhou Xianyan; Xiao Hanling; Yang Jianwen

    1999-01-01

    Through Michael addition reaction of trimethylolpropane triacrylate (TMPTA) with diethylamine (DEA), a new kind of tertiary amine derivative was synthesized and its structure was identified by 'H-NMR. When used in combination with benzophenone, this amine presented excellent curing speed and could be a substitute for initiator Darocur R 1173, which is effective but expensive. If so, the cost of UV-curable coatings can descend apparently. The functioning mechanism of benzophenone/amine bimolecular initiator was studied

  14. Application of the variational iteration method for system of initial value problems delay differential equations

    Science.gov (United States)

    Yousef, Hamood. M.; Ismail, A. I. B. MD.

    2017-08-01

    Many attempts have been presented to solve the system of Delay Differential Equations (DDE) with Initial Value Problem. As a result, it has shown difficulties when getting the solution or cannot be solved. In this paper, a Variational Iteration Method is employed to find out an approximate solution for the system of DDE with initial value problems. The example illustrates convenient and an efficiency comparison with the exact solution.

  15. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  16. Application of Artificial Thunderstorm Cells for the Investigation of Lightning Initiation Problems between a Thundercloud and the Ground

    Science.gov (United States)

    Temnikov, A. G.; Chernensky, L. L.; Orlov, A. V.; Lysov, N. Y.; Zhuravkova, D. S.; Belova, O. S.; Gerastenok, T. K.

    2017-12-01

    The results of the experimental application of artificial thunderstorm cells of negative and positive polarities for the investigation of the lightning initiation problems between the thundercloud and the ground using model hydrometeor arrays are presented. Possible options of the initiation and development of a discharge between the charged cloud and the ground in the presence of model hydrometeors are established. It is experimentally shown that groups of large hydrometeors of various shapes significantly increase the probability of channel discharge initiation between the artificial thunderstorm cell and the ground, especially in the case of positive polarity of the cloud. The authors assume that large hail arrays in the thundercloud can initiate the preliminary breakdown stage in the lower part of the thundercloud or initiate and stimulate the propagation of positive lightning from its upper part. A significant effect of the shape of model hydrometeors and the way they are grouped on the processes of initiation and stimulation of the channel discharge propagation in the artificial thunderstorm cell of negative or positive polarity-ground gap is experimentally established. It is found that, in the case of negative polarity of a charged cloud, the group of conductive cylindrical hydrometeors connected by a dielectric string more effectively initiates the channel discharge between the artificial thunderstorm cell and the ground. In the case of positive polarity of the artificial thunderstorm cell, the best effect of the channel discharge initiation is achieved for model hydrometeors grouped together by the dielectric tape. The obtained results can be used in the development of the method for the directed artificial lightning initiation between the thundercloud and the ground.

  17. Trial protocol: a parallel group, individually randomized clinical trial to evaluate the effect of a mobile phone application to improve sexual health among youth in Stockholm County.

    Science.gov (United States)

    Nielsen, Anna; De Costa, Ayesha; Bågenholm, Aspasia; Danielsson, Kristina Gemzell; Marrone, Gaetano; Boman, Jens; Salazar, Mariano; Diwan, Vinod

    2018-02-05

    Genital Chlamydia trachomatis infection is a major public health problem worldwide affecting mostly youth. Sweden introduced an opportunistic screening approach in 1982 accompanied by treatment, partner notification and case reporting. After an initial decline in infection rate till the mid-90s, the number of reported cases has increased over the last two decades and has now stabilized at a high level of 37,000 reported cases in Sweden per year (85% of cases in youth). Sexual risk-taking among youth is also reported to have significantly increased over the last 20 years. Mobile health (mHealth) interventions could be particularly suitable for youth and sexual health promotion as the intervention is delivered in a familiar and discrete way to a tech savvy at-risk population. This paper presents a protocol for a randomized trial to study the effect of an interactive mHealth application (app) on condom use among the youth of Stockholm. 446 youth resident in Stockholm, will be recruited in this two arm parallel group individually randomized trial. Recruitment will be from Youth Health Clinics or via the trial website. Participants will be randomized to receive either the intervention (which comprises an interactive app on safe sexual health that will be installed on their smart phones) or a control group (standard of care). Youth will be followed up for 6 months, with questionnaire responses submitted periodically via the app. Self-reported condom use over 6 months will be the primary outcome. Secondary outcomes will include presence of an infection, Chlamydia tests during the study period and proxy markers of safe sex. Analysis is by intention to treat. This trial exploits the high mobile phone usage among youth to provide a phone app intervention in the area of sexual health. If successful, the results will have implications for health service delivery and health promotion among the youth. From a methodological perspective, this trial is expected to provide

  18. Improving detection and initial management of gestational diabetes through the primary level of care in Morocco: protocol for a cluster randomized controlled trial.

    Science.gov (United States)

    Utz, Bettina; Assarag, Bouchra; Essolbi, Amina; Barkat, Amina; El Ansari, Nawal; Fakhir, Bouchra; Delamou, Alexandre; De Brouwere, Vincent

    2017-06-19

    Morocco is facing a growing prevalence of diabetes and according to latest figures of the World Health Organization, already 12.4% of the population are affected. A similar prevalence has been reported for gestational diabetes (GDM) and although it is not yet high on the national agenda, immediate and long-term complications threaten the health of mothers and future generations. A situational analysis on GDM conducted in 2015 revealed difficulties in access to screening and delays in receiving appropriate care. This implementation study has as objective to evaluate a decentralized GDM detection and management approach through the primary level of care and assess its potential for scaling up. We will conduct a hybrid effectiveness-implementation research using a cluster randomized controlled trial design in two districts of Morocco. Using the health center as unit of randomization we randomly selected 20 health centers with 10 serving as intervention and 10 as control facilities. In the intervention arm, providers will screen pregnant women attending antenatal care for GDM by capillary glucose testing during antenatal care. Women tested positive will receive nutritional counselling and will be followed up through the health center. In the control facilities, screening and initial management of GDM will follow standard practice. Primary outcome will be birthweight with weight gain during pregnancy, average glucose levels and pregnancy outcomes including mode of delivery, presence or absence of obstetric or newborn complications and the prevalence of GDM at health center level as secondary outcomes. Furthermore we will assess the quality of life /care experienced by the women in both arms. Qualitative methods will be applied to evaluate the feasibility of the intervention at primary level and its adoption by the health care providers. In Morocco, gestational diabetes screening and its initial management is fragmented and coupled with difficulties in access and

  19. The Moment Study: protocol for a mixed method observational cohort study of the Alternative Nicotine Delivery Systems (ANDS) initiation process among adult cigarette smokers.

    Science.gov (United States)

    Pearson, Jennifer L; Smiley, Sabrina L; Rubin, Leslie F; Anesetti-Rothermel, Andrew; Elmasry, Hoda; Davis, Megan; DeAtley, Teresa; Harvey, Emily; Kirchner, Thomas; Abrams, David B

    2016-04-22

    Alternative Nicotine Delivery Systems (ANDS) such as e-cigarettes are battery-powered devices that aerosolize nicotine and other substances to simulate smoking without using tobacco. Little is known about the ANDS initiation process among adult smokers. The aims of this research are threefold to: (1) examine how ANDS use affects cigarette use; (2) examine how the immediate environmental and psychosocial contexts of cigarette and ANDS use vary within-and between-participants in general and by menthol preference and race; and, (3) examine participants' 'lived experience' of the subjective perceptions, meaning, influences and utility of cigarette and ANDS use. This study's mixed method, 6-week longitudinal design will produce a detailed description of the ANDS initiation process among adult smokers (N=100). Qualitative and quantitative data collection will include 3 weeks of: (1) ecological momentary assessment of patterns of cigarette/ANDS use, satisfaction, mood and craving; (2) geospatial assessment of participants' environment, including indoor and outdoor cigarette/ANDS norms and rules; (3) in-depth interviews about the meaning and utility of cigarette smoking and ANDS use; and, (4) saliva cotinine and exhaled carbon monoxide (CO) biomarkers. A diverse sample will be recruited with an equal number of menthol and non-menthol cigarette smokers. As the primary independent variable, we will investigate how ANDS use affects cigarette consumption. We will also examine how smoking-related and ANDS-related rules and norms surrounding product use influence cigarette and ANDS product use, and how the subjective effects of ANDS use affect ANDS perceptions, beliefs and use. This study was funded by the National Institute on Drug Abuse of the US National Institutes of Health (1R21DA036472), registered at ClinicalTrials.gov (NCT02261363), and approved by the Chesapeake IRB (Pro00008526). Findings will be disseminated to the scientific and lay community through presentations

  20. Clinical application of micro-implant anchorage in initial orthodontic retraction.

    Science.gov (United States)

    Wahabuddin, Shaji; Mascarenhas, Rohan; Iqbal, Mahamad; Husain, Akhter

    2015-02-01

    Micro-implant is a device that is temporarily fixed to bone for the purpose of enhancing orthodontic anchorage either by supporting the teeth of the reactive unit or by obviating the need for the reactive unit altogether, and which is subsequently removed after use. The purpose of this study was to evaluate the clinical efficiency of micro-implants in reinforcing anchorage during the initial retraction of anterior teeth, check the rate of initial retraction for 8 weeks, and assess the stability of micro-implants during this period. Eighteen micro-implants were placed (10 in the maxilla and 8 in the mandible) and immediately loaded with 200-250 g of force using 9-mm closed coil Nitinol springs. The amount of space closure was measured every 2 weeks until the eighth week. Cephalometric measurements were made at the end of the study to evaluate anchor loss, if any. Micro-implant stability was also assessed. The rate of initial retraction in the maxilla at the end of 8 weeks was 1.65 mm/quadrant and 1.51 mm/quadrant in the mandible. The amount of retraction on the left side of the arches was 1.66 mm/quadrant and 1.49 mm/quadrant on the right side. The average initial retraction for both arches per month was 0.78 mm. An anchor loss of 0.1 mm (0.06%) was observed in the maxilla while no mandibular anchor loss was recorded. The rate of initial retraction observed in the maxilla was more than that achieved in the mandible. Initial retraction was also more on the left side of the arches. There was no anchor loss in the mandible. The micro-implant-reinforced anchorage was helpful in minimizing anchor loss and accepted heavy traction forces but did not bring about a faster rate of retraction.

  1. Poly(allyl methacrylate) functionalized hydroxyapatite nanocrystals via the combination of surface-initiated RAFT polymerization and thiol-ene protocol: a potential anticancer drug nanocarrier.

    Science.gov (United States)

    Bach, Long Giang; Islam, Md Rafiqul; Vo, Thanh-Sang; Kim, Se-Kwon; Lim, Kwon Taek

    2013-03-15

    Hydroxyapatite nanocrystals (HAP NCs) were encapsulated by poly(allyl methacrylate) (PolyAMA) employing controlled surface-initiated reversible addition-fragmentation chain transfer (SI-RAFT) polymerization of allyl methacrylate to afford HAP-PolyAMA nanohybrids. The subsequent thiol-ene coupling of nanohybrids with 2-mercaptosuccinic acid resulted HAP-Poly(AMA-COOH) possessing multicarboxyl group. The formation of the nanohybrids was confirmed by FT-IR and EDS analyses. The TGA and FE-SEM investigation were further suggested the grafting of PolyAMA onto HAP NCs. The utility of the HAP-PolyAMA nanohybrid as drug carrier was also explored. The pendant carboxyl groups on the external layers of nanohybrids were conjugated with anticancer drug cisplatin to afford HAP-Poly(AMA-COOH)/Pt complex. The formation of the complex was confirmed by FT-IR, XPS, and FE-SEM. In vitro evaluation of the synthesized complex as nanomedicine revealed its potential chemotherapeutic efficacy against cancer cell lines. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. Application of an Image Cytometry Protocol for Cellular and Mitochondrial Phenotyping on Fibroblasts from Patients with Inherited Disorders

    DEFF Research Database (Denmark)

    Fernandez-Guerra, Paula; Lund, Martin; Corydon, T J

    2015-01-01

    Cellular phenotyping of human dermal fibroblasts (HDFs) from patients with inherited diseases provides invaluable information for diagnosis, disease aetiology, prognosis and assessing of treatment options. Here we present a cell phenotyping protocol using image cytometry that combines measurements...... on a parallel one. We analysed HDFs from healthy individuals after treatment with various concentrations of hydrogen peroxide (H2O2) for different intervals, to mimic the physiological effects of oxidative stress. Our results show that cell number, viability, TRS and MMP decreased, while MSL increased both...... in a time- and concentration-dependent manner. To assess the use of our protocol for analysis of HDFs from patients with inherited diseases, we analysed HDFs from two patients with very long-chain acyl-CoA dehydrogenase (VLCAD) deficiency (VLCADD), one with a severe clinical phenotype and one with a mild...

  3. Application of the Putting Women First protocol in a study on violence against immigrant women in Spain.

    Science.gov (United States)

    Torrubiano-Domínguez, Jordi; Vives-Cases, Carmen

    2013-01-01

    In this paper, we describe our experience of using the Putting Women First protocol in the design and implementation of a cross-sectional study on violence against women (VAW) among 1607 immigrant women from Morocco, Ecuador and Romania living in Spain in 2011. The Putting Women First protocol is an ethical guideline for VAW research, which includes recommendations to ensure the safety of the women involved in studies on this subject. The response rate in this study was 59.3%. The prevalence of VAW cases last year was 11.7%, of which 15.6% corresponded to Ecuadorian women, 10.9% to Moroccan women and 8.6% to Romanian women. We consider that the most important goal for future research is the use of VAW scales validated in different languages, which would help to overcome the language barriers encountered in this study. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  4. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  5. Ontology-based configuration of problem-solving methods and generation of knowledge-acquisition tools: application of PROTEGE-II to protocol-based decision support.

    Science.gov (United States)

    Tu, S W; Eriksson, H; Gennari, J H; Shahar, Y; Musen, M A

    1995-06-01

    PROTEGE-II is a suite of tools and a methodology for building knowledge-based systems and domain-specific knowledge-acquisition tools. In this paper, we show how PROTEGE-II can be applied to the task of providing protocol-based decision support in the domain of treating HIV-infected patients. To apply PROTEGE-II, (1) we construct a decomposable problem-solving method called episodic skeletal-plan refinement, (2) we build an application ontology that consists of the terms and relations in the domain, and of method-specific distinctions not already captured in the domain terms, and (3) we specify mapping relations that link terms from the application ontology to the domain-independent terms used in the problem-solving method. From the application ontology, we automatically generate a domain-specific knowledge-acquisition tool that is custom-tailored for the application. The knowledge-acquisition tool is used for the creation and maintenance of domain knowledge used by the problem-solving method. The general goal of the PROTEGE-II approach is to produce systems and components that are reusable and easily maintained. This is the rationale for constructing ontologies and problem-solving methods that can be composed from a set of smaller-grained methods and mechanisms. This is also why we tightly couple the knowledge-acquisition tools to the application ontology that specifies the domain terms used in the problem-solving systems. Although our evaluation is still preliminary, for the application task of providing protocol-based decision support, we show that these goals of reusability and easy maintenance can be achieved. We discuss design decisions and the tradeoffs that have to be made in the development of the system.

  6. Effect of initialization time on application potentiality of a ZnO thin film based LPG sensor

    Directory of Open Access Journals (Sweden)

    Parta Mitra

    2009-09-01

    Full Text Available A prototype electronic LPG (Liquid Petroleum Gas sensor based on zinc oxide (ZnO film has been fabricated. The objective of the present work was to investigate the importance of initialization time (also called warm-up time on the application potentiality of the ZnO based alarm. The role of sensor geometry on initialization time is presented. The electronic circuitry of the prototype LPG device alarm is discussed. It is shown that that the initialization time depends on the switch off time (or the time for which the sensor was kept idle. The resistive mode sensors can be fixed at 40% LEL (Lower Explosive Limit of LPG for safe operation.

  7. 76 FR 53137 - Bundled Payments for Care Improvement Initiative: Request for Applications

    Science.gov (United States)

    2011-08-25

    ... organizations to participate in one or more of the initial four models under the Bundled Payments for Care... organizations must submit a nonbinding letter of intent by September 22, 2011 for Model 1 and November 4, 2011... environments that stimulate rapid development of new evidence-based knowledge. The models to be tested based on...

  8. 76 FR 81487 - Application of the Energy Planning and Management Program Power Marketing Initiative to the...

    Science.gov (United States)

    2011-12-28

    ... Management Program Power Marketing Initiative to the Boulder Canyon Project Post-2017 Remarketing AGENCY... . Information regarding Western's BCP Post-2017 marketing efforts, the Energy Management and Planning Program... Proposals. SUMMARY: The Western Area Power Administration (Western), a Federal power marketing agency of the...

  9. 76 FR 30147 - Application of the Energy Planning and Management Program Power Marketing Initiative to the...

    Science.gov (United States)

    2011-05-24

    ... Management Program Power Marketing Initiative to the Boulder Canyon Project AGENCY: Western Area Power.... SUMMARY: The Western Area Power Administration (Western), a Federal power marketing agency of the..., the Energy Management and Planning Program (Program), and the Conformed General Consolidated Power...

  10. The soil health tool - theory and initial broad-scale application

    Science.gov (United States)

    Soil health has traditionally been judged in terms of production; however, it recently has gained a wider focus with a global audience, as soil condition is becoming an environmental quality, human health, and political issue. A crucial initial step in evaluating soil health is properly assessing t...

  11. Los Alamos National Laboratory Training Capabilities (Possible Applications in the Global Initiatives for Proliferation Prevention Program)

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Olga [Los Alamos National Laboratory

    2012-06-04

    The briefing provides an overview of the training capabilities at Los Alamos National Laboratory that can be applied to nonproliferation/responsible science education at nuclear institutes in the Former Soviet Union, as part of the programmatic effort under the Global Initiatives for Proliferation Prevention program (GIPP).

  12. [Initial and extension applications for psychodynamic therapy according to the German Guidelines for Psychotherapy].

    Science.gov (United States)

    Lieberz, Klaus; Krumm, Bertram; Adamek, Lucie; Mühlig, Stephan

    2010-01-01

    According to the German Guidelines for Psychotherapy, psychotherapists need the consent of the respective insurance company to commence outpatient therapy. They have two options: (1) To begin a so-called short-term therapy (KZT) for up to 25 sessions--a quick and easy procedure requiring few formal expenses. Afterwards the therapist must provide the reasons for extending the therapy in a formal expert assessment request (extension request). (2) It is also possible to obtain the consent of the insurance company at the beginning of therapy (initial request) for up to 50 sessions (psychodynamic long-term therapy) or even for up to 160 sessions (analytical psychotherapy), both of which require the same expert assessment to be filled out beforehand (LZT). This study examines the initial and extension requests submitted for evaluation for psychodynamic therapies according to the German Guidelines for Psychotherapy. The question is posed as to what influences are important in the selection of therapists for these two types of request. In the context of the MARS study, we evaluated a total of 362 randomly chosen requests submitted between May 2007 and June 2008, 128 of which were initial requests and 234 of which were requests for an extension. The evaluation of the reports proceeded on the basis of a previously developed documentation system with various modules comprising information on the sociodemographics and morbidity of the patients as well as information on the therapists themselves. Further modules are assessed in this review. There were many more requests for an extension submitted than initial requests. Initial requests were preferably made when planning analytical psychotherapy. Patients for whom initial requests were submitted were also distinctly younger. The morbidity of the patients had no noticeable influence on the choice of procedure. In particular, diagnoses that could require crisis intervention were not more common in the requests for an extension

  13. Civilian applications of particle-beam-initiated inertial confinement fusion technology

    International Nuclear Information System (INIS)

    Varnado, S.G.; Mitchiner, J.L.

    1977-05-01

    Electrical power generation by controlled fusion may provide a partial solution to the world's long-term energy supply problem. Achievement of a fusion reaction requires the confinement of an extremely hot plasma for a time long enough to allow fuel burnup. Inertial confinement of the plasma may be possible through the use of tightly focused, relativistic electron or ion beams to compress a fuel pellet. The Sandia Particle Beam Fusion program is developing the particle-beam accelerators necessary to achieve fuel ignition. In this report we review the status of the particle-beam fusion technology development program and identify several potential civilian applications for this technology. We describe program objectives, discuss the specific accelerators presently under development, and briefly review the results of beam-focusing and target-irradiation experiments. Then we identify and discuss applications for the beam technology and for the fusion neutrons. The applications are grouped into near-term, intermediate-term, and long-term categories. Near-term applications for the beam technology include electron-beam (e-beam) pumping of gas lasers and several commercial applications. Intermediate-term applications (pellet gain less than 50) include hybrid reactors for electrical power production and fissile fuel breeding, pure fusion reactors for electrical power production, and medical therapy using ion accelerators. In the long term, complex, high-gain pellets may be used in pure fusion reactors

  14. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  15. Study protocol for the Integra Initiative to assess the benefits and costs of integrating sexual and reproductive health and HIV services in Kenya and Swaziland

    Directory of Open Access Journals (Sweden)

    Warren Charlotte E

    2012-11-01

    Full Text Available Abstract Background In sub-Saharan Africa (SSA there are strong arguments for the provision of integrated sexual and reproductive health (SRH and HIV services. Most HIV transmissions are sexually transmitted or associated with pregnancy, childbirth, and breastfeeding. Many of the behaviours that prevent HIV transmission also prevent sexually transmitted infections and unintended pregnancies. There is potential for integration to increase the coverage of HIV services, as individuals who use SRH services can benefit from HIV services and vice-versa, as well as increase cost-savings. However, there is a dearth of empirical evidence on effective models for integrating HIV/SRH services. The need for robust evidence led a consortium of three organizations – International Planned Parenthood Federation, Population Council and the London School of Hygiene & Tropical Medicine – to design/implement the Integra Initiative. Integra seeks to generate rigorous evidence on the feasibility, effectiveness, cost and impact of different models for delivering integrated HIV/SRH services in high and medium HIV prevalence settings in SSA. Methods/design A quasi-experimental study will be conducted in government clinics in Kenya and Swaziland – assigned into intervention/comparison groups. Two models of service delivery are investigated: integrating HIV care/treatment into 1 family planning and 2 postnatal care. A full economic-costing will be used to assess the costs of different components of service provision, and the determinants of variations in unit costs across facilities/service models. Health facility assessments will be conducted at four time-periods to track changes in quality of care and utilization over time. A two-year cohort study of family planning/postnatal clients will assess the effect of integration on individual outcomes, including use of SRH services, HIV status (known/unknown and pregnancy (planned/unintended. Household surveys within some

  16. The application of a "6S Lean" initiative to improve workflow for emergency eye examination rooms.

    Science.gov (United States)

    Nazarali, Samir; Rayat, Jaspreet; Salmonson, Hilary; Moss, Theodora; Mathura, Pamela; Damji, Karim F

    2017-10-01

    Ophthalmology residents on call at the Royal Alexandra Hospital identified workplace disorganization and lack of standardization in emergency eye examination rooms as an impediment to efficient patient treatment. The aim of the study was to use the "6S Lean" model to improve workflow in eye examination rooms at the Royal Alexandra Hospital. With the assistance of quality improvement consultants, the "6S Lean" model was applied to the current operation of the emergency eye clinic examination rooms. This model, considering 8 waste categories, was then used to recommend and implement changes to the examination rooms and to workplace protocols to enhance efficiency and safety. Eye examination rooms were improved with regards to setup, organization of supplies, inventory control, and maintenance. All targets were achieved, and the 5S audit checklist score increased by 33 points from 44 to 77. Implementation of the 6S methodology is a simple approach that removes inefficiencies from the workplace. The ophthalmology clinic removed waste from all 8 waste categories, increased audit results, mitigated patient and resident safety risks, and ultimately redirected resident time back to patient care delivery. Copyright © 2017 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  17. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  18. The determination of initial ratio of strontium isotope in rocks and its geological application

    International Nuclear Information System (INIS)

    Ying Junlong; Zhao Puyun; Lin Xiulan

    1989-04-01

    The method to determine the initial ratio of strontium isotopes existed in rocks of poor rubidium and rich strontium and main carrier minerals is introduced. The initial ratio obtained from this method is equivalent to that acquired by Rb-Sr isochrone. Based on this result, information on regional rock genesis and mineralization regularities can be provided. It has great significance in the research on activities of ancient continental margin and material sources as well as their evolution. The migration of rock, and ore-forming materials, matallogenetic mechanism and its distribution in the space and time evolution are studied by using these data. In conclusion, the determination of strontium isotopes has broad prospects in the geological research

  19. Application of Global Reporting Initiative (GRI) in the sustainability reporting of financial services

    OpenAIRE

    MONTE, TOMAS

    2009-01-01

    Sustainability reporting refers to the process in which an organization gives an account of issues related to corporate sustainability over a particular reporting period. The report is meant for both internal and external use. Sustainability reporting gives information about the organization’s interactions with its social and ecological environment. The Global Reporting Initiative (GRI) has pioneered the development of the world’s most widely used sustainability reporting framework. GRI Repor...

  20. GEOGRAPHIC INFORMATION SYSTEMS AND APPLIED ECONOMICS: AN INITIAL DISCUSSION OF POTENTIAL APPLICATIONS AND CONTRIBUTIONS

    OpenAIRE

    Taupier, Richard; Willis, Cleve E.

    1994-01-01

    Geographic Information Systems (GIS) are becoming increasingly important to virtually all of the natural and social sciences. Applied economists will find that GIS can make valuable contributions to many of the problems with which they are concerned. Moreover, a great deal of the science behind GIS technology would benefit from the contributions of applied economists. This paper presents some initial suggestions for the ways in which GIS may be important to economics and the GIS related issue...

  1. The Belgian trial with azithromycin for acute COPD exacerbations requiring hospitalization: an investigator-initiated study protocol for a multicenter, randomized, double-blind, placebo-controlled trial

    Directory of Open Access Journals (Sweden)

    Vermeersch K

    2016-03-01

    3 days, followed by a maintenance dose of 250 mg once every 2 days. The primary endpoint is the time-to-treatment failure during the treatment phase (ie, from the moment of randomization until the end of intervention. Treatment failure is a novel composite endpoint defined as either death, the admission to intensive care or the requirement of additional systemic steroids or new antibiotics for respiratory reasons, or the diagnosis of a new AE after discharge.Discussion: We investigate whether azithromycin initiated at the onset of a severe exacerbation, with a limited duration and at a low dose, might be effective and safe in the highest risk period during and immediately after the acute event. If proven effective and safe, this targeted approach may improve the treatment of severe AEs and redirect the preventive use of azithromycin in COPD to a temporary intervention in the subgroup with the highest unmet needs. Keywords: COPD, acute exacerbation, macrolide antibiotics, azithromycin, physical activity, RCT

  2. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  3. Fabrication of luminescent hydroxyapatite nanorods through surface-initiated RAFT polymerization: Characterization, biological imaging and drug delivery applications

    Energy Technology Data Exchange (ETDEWEB)

    Heng, Chunning [Shaanxi Key Laboratory of Degradable Biomedical Materials, Shaanxi R& D Center of Biomaterials and Fermentation Engineering, School of Chemical and Engineering, Northwest University, Xi’an, 710069 (China); Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Zheng, Xiaoyan [Shaanxi Key Laboratory of Degradable Biomedical Materials, Shaanxi R& D Center of Biomaterials and Fermentation Engineering, School of Chemical and Engineering, Northwest University, Xi’an, 710069 (China); Liu, Meiying; Xu, Dazhuang; Huang, Hongye; Deng, Fengjie [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Hui, Junfeng, E-mail: huijunfeng@126.com [Shaanxi Key Laboratory of Degradable Biomedical Materials, Shaanxi R& D Center of Biomaterials and Fermentation Engineering, School of Chemical and Engineering, Northwest University, Xi’an, 710069 (China); Zhang, Xiaoyong, E-mail: xiaoyongzhang1980@gmail.com [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wei, Yen, E-mail: weiyen@tsinghua.edu.cn [Department of Chemistry and the Tsinghua Center for Frontier Polymer Research, Tsinghua University, Beijing, 100084 (China)

    2016-11-15

    Highlights: • Hydrophobic hydroxyapatite nanorods were obtained from hydrothermal synthesis. • Surface initiated RAFT polymerization was adopted to surface modification of hydroxyapatite nanorods. • These modified hydroxyapatite nanorods showed high water dispersibility and biocompatibility. • These modified hydroxyapatite nanorods can be used for controlled drug delivery. - Abstract: Hydroxyapatite nanomaterials as an important class of nanomaterials, have been widely applied for different biomedical applications for their excellent biocompatibility, biodegradation potential and low cost. In this work, hydroxyapatite nanorods with uniform size and morphology were prepared through hydrothermal synthesis. The surfaces of these hydroxyapatite nanorods are covered with hydrophobic oleic acid, making them poor dispersibility in aqueous solution and difficult for biomedical applications. To overcome this issue, a simple surface initiated polymerization strategy has been developed via combination of the surface ligand exchange and reversible addition fragmentation chain transfer (RAFT) polymerization. Hydroxyapatite nanorods were first modified with Riboflavin-5-phosphate sodium (RPSSD) via ligand exchange reaction between the phosphate group of RPSSD and oleic acid. Then hydroxyl group of nHAp-RPSSD was used to immobilize chain transfer agent, which was used as the initiator for surface-initiated RAFT polymerization. The nHAp-RPSSD-poly(IA-PEGMA) nanocomposites were characterized by means of {sup 1}H nuclear magnetic resonance, Fourier transform infrared spectroscopy, fluorescence spectroscopy and thermal gravimetric analysis in detailed. The biocompatibility, biological imaging and drug delivery of nHAp-RPSSD-poly(IA-PEGMA) were also investigated. Results showed that nHAp-RPSSD-poly(IA-PEGMA) exhibited excellent water dispersibility, desirable optical properties, good biocompatibility and high drug loading capability, making them promising candidates for

  4. Fabrication of luminescent hydroxyapatite nanorods through surface-initiated RAFT polymerization: Characterization, biological imaging and drug delivery applications

    International Nuclear Information System (INIS)

    Heng, Chunning; Zheng, Xiaoyan; Liu, Meiying; Xu, Dazhuang; Huang, Hongye; Deng, Fengjie; Hui, Junfeng; Zhang, Xiaoyong; Wei, Yen

    2016-01-01

    Highlights: • Hydrophobic hydroxyapatite nanorods were obtained from hydrothermal synthesis. • Surface initiated RAFT polymerization was adopted to surface modification of hydroxyapatite nanorods. • These modified hydroxyapatite nanorods showed high water dispersibility and biocompatibility. • These modified hydroxyapatite nanorods can be used for controlled drug delivery. - Abstract: Hydroxyapatite nanomaterials as an important class of nanomaterials, have been widely applied for different biomedical applications for their excellent biocompatibility, biodegradation potential and low cost. In this work, hydroxyapatite nanorods with uniform size and morphology were prepared through hydrothermal synthesis. The surfaces of these hydroxyapatite nanorods are covered with hydrophobic oleic acid, making them poor dispersibility in aqueous solution and difficult for biomedical applications. To overcome this issue, a simple surface initiated polymerization strategy has been developed via combination of the surface ligand exchange and reversible addition fragmentation chain transfer (RAFT) polymerization. Hydroxyapatite nanorods were first modified with Riboflavin-5-phosphate sodium (RPSSD) via ligand exchange reaction between the phosphate group of RPSSD and oleic acid. Then hydroxyl group of nHAp-RPSSD was used to immobilize chain transfer agent, which was used as the initiator for surface-initiated RAFT polymerization. The nHAp-RPSSD-poly(IA-PEGMA) nanocomposites were characterized by means of "1H nuclear magnetic resonance, Fourier transform infrared spectroscopy, fluorescence spectroscopy and thermal gravimetric analysis in detailed. The biocompatibility, biological imaging and drug delivery of nHAp-RPSSD-poly(IA-PEGMA) were also investigated. Results showed that nHAp-RPSSD-poly(IA-PEGMA) exhibited excellent water dispersibility, desirable optical properties, good biocompatibility and high drug loading capability, making them promising candidates for biological

  5. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  6. 7 CFR 1493.240 - Initial application and letter of preliminary commitment.

    Science.gov (United States)

    2010-01-01

    ... FGP payment guarantee; (6) The period for which credit is being extended to finance the sale of goods... including, where applicable, brand name, model number, Standard Industrial Classification (SIC) or the North American Industry Classification System (NAICS) code, and contract specifications; (10) The final date for...

  7. 77 FR 10663 - Due Date of Initial Application Requirements for State Home Construction Grants

    Science.gov (United States)

    2012-02-23

    ... aggregate, or by the private sector, of $100 million or more (adjusted annually for inflation) in any given year. This rule would have no such effect on State, local, and tribal governments, or on the private... anomalously high number of applications. We acknowledge that the ARRA increased the 2010 workload but maintain...

  8. Initial Screening of Environmentally Sustainable Surface Pretreatments for Adhesive Bonding Applications

    Science.gov (United States)

    2017-05-17

    13. SUPPLEMENTARY NOTES 14. ABSTRACT A methacrylate adhesive marketed for high-temperature applications was screened in combination with...conditioning = RT. Mode-of-failure = mixed - mode (MM). ........................................................................................ 26 Fig. B-3...moisture exposure conditions. Additionally, as environmental regulations force various chemicals from the commercial market , the pretreatments and

  9. Development and application of an initial quality assurance program for dosimetry at GSI

    Energy Technology Data Exchange (ETDEWEB)

    Heeg, P; Hartmann, G; Jaekel, O; Karger, C; Kriessbach, A [DKFZ Heidelberg (Germany); Schardt, D [GSI Darmstadt (Germany)

    1997-09-01

    c set of test procedures has been developed for dosimetric quality inspections at the heavy ion therapy facility at GSI. In some cases new test principles had to be established to meet the requirements at the heavy ion beam. As a first application the acceptance test has been carried out during the technical commissioning of the facility. (orig.)

  10. Application of Appropriate Use Criteria for Initial Transthoracic Echocardiography in an Academic Outpatient Pediatric Cardiology Program.

    Science.gov (United States)

    Safa, Raya; Aggarwal, Sanjeev; Misra, Amrit; Kobayashi, Daisuke

    2017-08-01

    Transthoracic echocardiography (TTE) is a non-invasive diagnostic modality for children with suspected heart disease. The American College of Cardiology published Appropriate Use Criteria (AUC) for an initial outpatient pediatric TTE in 2014 to promote effective care and improve resource utilization. The objective was to determine the appropriateness of TTE per the published AUC in a single academic pediatric cardiology clinic as a baseline performance quality measure. The echocardiography database was used to identify initial outpatient TTE in children during January-March 2014. TTE indications (appropriate [A], may be appropriate [M], or rarely appropriate [R]) and findings (normal, incidental, or abnormal) were recorded. The effect of AUC and age groups on yield of abnormal TTE findings was analyzed. Of the 2166 screened studies, our study cohort consisted of 247 TTEs. Indications rated A, M, and R were found in 129, 27, and 90, respectively, and 1 was unclassifiable. Majority of TTE (n = 183) were normal, although incidental findings were noted in 32 and abnormal findings in 32 cases. Abnormal findings were noted in 26/129 of A, 2/27 of M, and 4/90 of R. Indications rated A were significantly associated with yield of abnormal TTE findings, adjusted by age group. Infants and adolescents were more likely to have abnormal TTE findings compared to young children. Recently published AUC were validated for initial TTE in the outpatient pediatric cardiology clinic. Appropriateness rated by AUC was highly associated with yield of abnormal TTE findings and worked best in infants and adolescent.

  11. Application of the principle of Open Initiatives in developing Trakai tourism infrastructure

    Directory of Open Access Journals (Sweden)

    Eugenijus Nazelskis

    2013-01-01

    Full Text Available This article aims to identify the principle of open initiatives, launched by Trakai resort municipality, which is focused on infrastructure development in order to open the way for widespread participation of natural and legal persons in infrastructure projects and to define the strategic directions in tourism development and infrastructure projects that apply this principle. In addition, it aims to assess the effectiveness of this principle as well as its practical benefits to the expansion of tourism infrastructure and the development of new tourism products.

  12. Northern Eurasia Earth Science Partnership Initiative: evolution of scientific investigations to applicable science

    International Nuclear Information System (INIS)

    Soja, Amber J; Groisman, Pavel Ya

    2012-01-01

    The letters collected in this focus issue of Environmental Research Letters on ‘Environmental, socio-economic and climatic changes in Northern Eurasia and their feedbacks to the global Earth system’ represent the third special issue based on the results of research within the Northern Eurasia Earth Science Partnership Initiative (NEESPI: http://neespi.org) program domain. Through the years, NEESPI researchers have presented a diverse array of articles that represent a variety of spatial scales and demonstrate the degree to which abrupt climatic and socio-economic changes are acting across Northern Eurasia and feed back to the global Earth system. (synthesis and review)

  13. Applicability of initial optimal maternal and fetal electrocardiogram combination vectors to subsequent recordings

    International Nuclear Information System (INIS)

    Yan Hua-Wen; Huang Xiao-Lin; Zhao Ying; Si Jun-Feng; Liu Hong-Xing; Liu Tie-Bing

    2014-01-01

    A series of experiments are conducted to confirm whether the vectors calculated for an early section of a continuous non-invasive fetal electrocardiogram (fECG) recording can be directly applied to subsequent sections in order to reduce the computation required for real-time monitoring. Our results suggest that it is generally feasible to apply the initial optimal maternal and fetal ECG combination vectors to extract the fECG and maternal ECG in subsequent recorded sections. (interdisciplinary physics and related areas of science and technology)

  14. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  15. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  16. Fast and easy protocol for the purification of recombinant S-layer protein for synthetic biology applications

    KAUST Repository

    Norville, Julie E.

    2011-06-17

    A goal of synthetic biology is to make biological systems easier to engineer. One of the aims is to design, with nanometer-scale precision, biomaterials with well-defined properties. The surface-layer protein SbpA forms 2D arrays naturally on the cell surface of Lysinibacillus sphaericus, but also as the purified protein in solution upon the addition of divalent cations. The high propensity of SbpA to form crystalline arrays, which can be simply controlled by divalent cations, and the possibility to genetically alter the protein, make SbpA an attractive molecule for synthetic biology. To be a useful tool, however, it is important that a simple protocol can be used to produce recombinant wild-type and modified SbpA in large quantities and in a biologically active form. The present study addresses this requirement by introducing a mild and non-denaturing purification protocol to produce milligram quantities of recombinant, active SbpA.

  17. Application of an Original Wildfire Smoke Health Cost Benefits Transfer Protocol to the Western US, 2005-2015

    Science.gov (United States)

    Jones, Benjamin A.; Berrens, Robert P.

    2017-11-01

    Recent growth in the frequency and severity of US wildfires has led to more wildfire smoke and increased public exposure to harmful air pollutants. Populations exposed to wildfire smoke experience a variety of negative health impacts, imposing economic costs on society. However, few estimates of smoke health costs exist and none for the entire Western US, in particular, which experiences some of the largest and most intense wildfires in the US. The lack of cost estimates is troublesome because smoke health impacts are an important consideration of the overall costs of wildfire. To address this gap, this study provides the first time series estimates of PM2.5 smoke costs across mortality and several morbidity measures for the Western US over 2005-2015. This time period includes smoke from several megafires and includes years of record-breaking acres burned. Smoke costs are estimated using a benefits transfer protocol developed for contexts when original health data are not available. The novelty of our protocol is that it synthesizes the literature on choices faced by researchers when conducting a smoke cost benefit transfer. On average, wildfire smoke in the Western US creates 165 million in annual morbidity and mortality health costs.

  18. SACM and the RCRA stabilization initiative: Similarities of principles and applicability

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-01-01

    The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the corrective action provisions of the Resource Conservation and Recovery Act (RCRA) provide standards for the remediation of environmental media contaminated with hazardous substances or hazardous waste, respectively. In both cases, prior to the US Environmental Protection Agency`s (EPA) development of the two subject reform initiatives, existing formal processes specified the level of site investigation required, the process for reaching a decision on the method of remediation, public participation in the decision process, and enforcement authorities that include orders and schedules of compliance. Traditionally, implementation of these processes has resulted in a great amount of time, effort, and money being expended before actual remediation began. Following criticism from the public and the regulated community, the EPA has proposed streamlining reforms for hazardous waste site cleanup under both CERCLA and RCRA that will begin remediation sooner with lower costs. The purpose of this Information Brief is to discuss the common goals, processes, and strategies of the Superfund Accelerated Cleanup Model (SACM) and the RCRA Stabilization Initiative.

  19. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  20. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    International Nuclear Information System (INIS)

    2012-01-01

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met [es

  1. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  2. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  3. Protocol Additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into force

    International Nuclear Information System (INIS)

    2004-01-01

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, the Additional Protocol, which was applied provisionally from 12 June 1998, entered into force on 11 June 2004, the date upon which the Agency received written notification from Ghana that Ghana's statutory and/or constitutional requirements for entry into force had been met. The text of the Additional Protocol is reproduced in document INFCIRC/226/Add.1

  4. Application of wire beam electrode technique to investigate initiation and propagation of rebar corrosion

    International Nuclear Information System (INIS)

    Shi, Wei; Dong, Ze Hua; Kong, De Jie; Guo, Xing Peng

    2013-01-01

    Multi-electrode technique named as wire beam electrode (WBE) was used to study pitting corrosion of rebar under concrete cover. When WBE embedded mortar sample was immersed in NaCl solution, uneven distributions of galvanic current and open circuit potential (OCP) on the WBE were observed due to the initiation of pitting corrosion. The following oxygen depletion in mortar facilitated the negative shift of the OCP and the smoothing of the current and potential distributions. Wetting–drying cycle experiments showed that corrosion products instead of oxygen in wet mortar specimen sustained the propagation of pitting corrosion due to Fe (III) taking part in cathodic depolarization during oxygen-deficient wet period, which was confirmed by micro-Raman spectroscopy. In addition, new pitting corrosion occurred mainly near the corrosion products, leading to preferentially horizontal propagation of rust layer on the WBE. A localized corrosion factor was further presented to quantify the localised corrosion based on galvanic current maps

  5. Fabrication and Characteristics of Al/PTFE Multilayers and Application in Micro-initiator

    Science.gov (United States)

    Zhang, Yuxin; Jiang, Hongchuan; Zhao, Xiaohui; Zhang, Wanli; Li, Yanrong

    2017-12-01

    In this paper, a micro-initiator was designed and fabricated by integrating Al/PTFE multilayers with a Cu film bridge. The regularity layer structure and interface composition of Al/PTFE multilayers was analysed by transmission electron microscope and X-ray photoelectron spectroscopy, respectively. The heat release reaction in Al/PTFE multilayers can be triggered with reaction temperature of 430 °C, and the overall heat of reaction is 3192 J/g. Al/PTFE multilayers with bilayer thickness of 200 nm was alternately deposited on a Cu film bridge to improve the electric explosion performances. Compared to Cu film bridge, the Al/PTFE/Cu integrated film bridge exhibits improved performances with longer explosion duration time, more violent explosion phenomenon and larger quantities of ejected product particles.

  6. Application of wire beam electrode technique to investigate initiation and propagation of rebar corrosion

    Energy Technology Data Exchange (ETDEWEB)

    Shi, Wei; Dong, Ze Hua, E-mail: zehua.dong@gmail.com; Kong, De Jie; Guo, Xing Peng

    2013-06-15

    Multi-electrode technique named as wire beam electrode (WBE) was used to study pitting corrosion of rebar under concrete cover. When WBE embedded mortar sample was immersed in NaCl solution, uneven distributions of galvanic current and open circuit potential (OCP) on the WBE were observed due to the initiation of pitting corrosion. The following oxygen depletion in mortar facilitated the negative shift of the OCP and the smoothing of the current and potential distributions. Wetting–drying cycle experiments showed that corrosion products instead of oxygen in wet mortar specimen sustained the propagation of pitting corrosion due to Fe (III) taking part in cathodic depolarization during oxygen-deficient wet period, which was confirmed by micro-Raman spectroscopy. In addition, new pitting corrosion occurred mainly near the corrosion products, leading to preferentially horizontal propagation of rust layer on the WBE. A localized corrosion factor was further presented to quantify the localised corrosion based on galvanic current maps.

  7. Text of a Protocol between the Agency and the Governments of Norway and the United States of America in Connection with the Application of Safeguards under a Co-Operation Agreement between the Two Governments

    International Nuclear Information System (INIS)

    1973-01-01

    The text of a protocol between the Agency and the Governments of Norway and the United States of America in connection with the application of safeguards under the Agreement for Co-operation between the Government of the United States of America and the Government of Norway Concerning Civil Uses of Atomic Energy signed on 4 May 1967, as amended, is reproduced herein for the information of all Members. The protocol entered into force on 25 September 1973 pursuant to Section 4.

  8. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998 [fr

  9. Protocol Additional to the Agreement between Canada and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998 [fr

  10. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003 [fr

  11. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria [es

  12. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003 [es

  13. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria [es

  14. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997 [es

  15. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [es

  16. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-09-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  17. Protocol Additional to the Agreement between the Government of the Republic of Turkey and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Turkey and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 6 July 2000

  18. Protocol Additional to the Agreement between the Republic of Panama and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Panama and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America (TLATELOLCO) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 29 November 2001. It was signed in the City of Panama on 11 December 2001

  19. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  20. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  1. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998 [es

  2. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  3. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  4. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000.

  5. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-10-29

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999.

  6. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-10-29

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date.

  7. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  8. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  9. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-09-14

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000.

  10. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000.

  11. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-25

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  12. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  13. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  14. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998

  15. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria

  16. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  17. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  18. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria

  19. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  20. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  1. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [fr

  2. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna

  3. Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2010. It was signed on 7 October 2011 in Banjul, The Gambia, and on 18 October 2011 in Vienna, Austria

  4. Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed in Vienna on 22 September 2005

  5. Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 14 September 2004. It was signed on 9 December 2004 in Vienna

  6. Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 September 2001. It was signed in Vienna on 5 December 2001

  7. Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 1997. It was signed in Vienna on 29 September 1997

  8. Protocol between the Democratic Republic of Congo and the International Atomic Energy Agency Additional to the Agreement for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Zaire and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT)1 is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 28 November 2002. It was signed in Vienna on 9 April 2003

  9. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna [es

  10. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna [es

  11. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010 [es

  12. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria [es

  13. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997 [fr

  14. Protocol Additional to the agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into force

    International Nuclear Information System (INIS)

    2004-01-01

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, the Additional Protocol entered into force on 28 June 2004, the date on which the Agency received from Armenia written notification that Armenia's statutory and/or constitutional requirements for entry into force had been met

  15. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna [es

  16. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  17. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000

  18. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  19. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-08-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  20. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  1. APPLICATION OF SOFT COMPUTING TECHNIQUES FOR PREDICTING COOLING TIME REQUIRED DROPPING INITIAL TEMPERATURE OF MASS CONCRETE

    Directory of Open Access Journals (Sweden)

    Santosh Bhattarai

    2017-07-01

    Full Text Available Minimizing the thermal cracks in mass concrete at an early age can be achieved by removing the hydration heat as quickly as possible within initial cooling period before the next lift is placed. Recognizing the time needed to remove hydration heat within initial cooling period helps to take an effective and efficient decision on temperature control plan in advance. Thermal properties of concrete, water cooling parameters and construction parameter are the most influencing factors involved in the process and the relationship between these parameters are non-linear in a pattern, complicated and not understood well. Some attempts had been made to understand and formulate the relationship taking account of thermal properties of concrete and cooling water parameters. Thus, in this study, an effort have been made to formulate the relationship for the same taking account of thermal properties of concrete, water cooling parameters and construction parameter, with the help of two soft computing techniques namely: Genetic programming (GP software “Eureqa” and Artificial Neural Network (ANN. Relationships were developed from the data available from recently constructed high concrete double curvature arch dam. The value of R for the relationship between the predicted and real cooling time from GP and ANN model is 0.8822 and 0.9146 respectively. Relative impact on target parameter due to input parameters was evaluated through sensitivity analysis and the results reveal that, construction parameter influence the target parameter significantly. Furthermore, during the testing phase of proposed models with an independent set of data, the absolute and relative errors were significantly low, which indicates the prediction power of the employed soft computing techniques deemed satisfactory as compared to the measured data.

  2. Development and initial evaluation of a mobile application to help with mindfulness training and practice.

    Science.gov (United States)

    Plaza García, Inmaculada; Sánchez, Carlos Medrano; Espílez, Ángel Sánchez; García-Magariño, Iván; Guillén, Guillermo Azuara; García-Campayo, Javier

    2017-09-01

    Different review articles support the usefulness and effectiveness of mindfulness techniques in health and wellbeing. In this paper we present a first prototype of a mobile application to help with the training and practice of mindfulness, taking into account the lacks detected in a previous literature review. Our aim was to measure acceptance and perceived quality, as well as gather data about app usage. Their dependence on demographic variables and the change in mindful level was also measured. Two versions of a new application were developed, "Mindfulness" and "Mindfulness Sci". The application has been tested in two pilot studies: in traditional face-to-face mindfulness groups and in individual and independent use. 3977 users were involved in this study: 26 in the first trial during an 8-week usage period and 3951 in the second trial during 17 months. In the first study, participants assessed the app with high scores. They considered it as a helping tool for mindfulness practice, user-friendly and with high quality of use. The positive perception was maintained after 8-weeks meditation workshops, and participants considered that its use could contribute to obtain benefits for mental and physical health. In the second study, we found rather weak associations between usage time and age, nationality and educational level. The mindful level showed a weak positive correlation with the session accomplished but slightly above the boundary of statistical significance (p-value=0.051). Videos and information stood out as the most accessed resources. Up to our knowledge, this is the first app developed with the help of health professionals in Spanish that could be used with a general aim, in health and wellbeing. The results are promising with a positive evaluation in face-to-face and independent use situations. Therefore, the number of potential users is enormous in a global worldwide context. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Initiating collaboration among organ transplant professionals through Web portals and mobile applications.

    Science.gov (United States)

    Alexander, Susan; Hoy, Haley; Maskey, Manil; Conover, Helen; Gamble, John; Fraley, Anne

    2013-05-13

    The knowledge base for healthcare providers working in the field of organ transplantation has grown exponentially. However, the field has no centralized 'space' dedicated to efficient access and sharing of information. The ease of use and portability of mobile applications (apps) make them ideal for subspecialists working in complex healthcare environments. In this article, the authors review the literature related to healthcare technology; describe the development of health-related technology; present their mobile app pilot project assessing the effects of a collaborative, mobile app based on a freely available content manage framework; and report their findings. They conclude by sharing both lessons learned while completing this project and future directions.

  4. [Google Flu Trends--the initial application of big data in public health].

    Science.gov (United States)

    Zou, Xiaohui; Zhu, Wenfei; Yang, Lei; Shu, Yuelong

    2015-06-01

    Google Flu Trends (GFT) was the first application of big data in the public health field. GFT was open online in 2009 and attracted worldwide attention immediately. However, GFT failed catching the 2009 pandemic H1N1 and kept overestimating the intensity of influenza-like illness in the 2012-2014 season in the United States. GFT model has been updated for three times since 2009, making its prediction bias controlled. Here, we summarized the mechanism GFT worked, the strategy GFT used to update, and its influence on public health.

  5. Initial Testing of the Microscopic Depletion Implementation in the MAMMOTH Reactor Physics Application

    Energy Technology Data Exchange (ETDEWEB)

    Ortensi, J. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wang, Y. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Schunert, S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Ganapol, B. D. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Gleicher, F. N. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Baker, B. [Idaho National Lab. (INL), Idaho Falls, ID (United States); DeHart, M. D. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-09-01

    Present and new nuclear fuels that will be tested at the Transient Reactor Test (TREAT) facility will be analyzed with the MAMMOTH reactor physics application, currently under development, at Idaho National Laboratory. MAMMOTH natively couples the BISON, RELAP-7, and Rattlesnake applications within the MOOSE framework. This system allows the irradiation of fuel from beginning of life in a nuclear reactor until it is placed in TREAT for fuel testing within the same analysis mesh and, thus, retaining a very high level of resolution and fidelity. The calculation of the isotopic distribution in fuel requires the solution to the decay and transmutation equations coupled to the neutron transport equation. The Chebyshev Rational Approximation Method (CRAM) is the current state-of-the-art in the field, as was chosen to be the solver for the decay and transmutation equations. This report shows that the implementation of the CRAM solver within MAMMOTH is correct with various analytic benchmarks for decay and transmutation of nuclides. The results indicate that the solutions with CRAM order 16 achieve the level of precision of the benchmark. The CRAM solutions show little sensitivity to the time step size and consistently produce a high level of accuracy for isotopic decay for time steps of 1x10^11 years. Comparisons to DRAGON5 with 297 isotopes yield comparable results, but some differences need to be further analyzed.

  6. An initial applications study of ceria-gadolinia solid oxide fuel cells: V. 1

    Energy Technology Data Exchange (ETDEWEB)

    Bauen, A.; Hart, D.; Mould, B.

    1998-11-01

    Fuel cells are categorised by their electrolytes, and the solid oxide fuel cell is so called because its electrolyte consists of a solid ceramic oxide. Commonly this has been a form of zirconia, though other materials are now being considered for their different electrical properties. One of these, ceria doped with gadolinia, shows promise for use in lower temperature regimes than zirconia, and may open up different areas of a future market for consideration. This report considers the opportunities for ceria-gadolinia solid oxide fuel cell systems by comparing them with the application requirements in markets where fuel cells may have potential. The advantages and disadvantages of the technology are analysed, together with the state of the art in research and development. The direction in which research effort needs to move to address some of the issues is assessed. The report then draws conclusions regarding the potential of ceria-gadolinia in solid oxide fuel cell systems and in the energy markets as a whole. It should be noted that while this report is an applications study, some technology assessment has been included. Much of this is found in Volume 2. (author)

  7. EPA Supersites Program-related emissions-based particulate matter modeling: initial applications and advances.

    Science.gov (United States)

    Russell, Armistead G

    2008-02-01

    One objective of the U.S. Environmental Protection Agency's (EPA's) Supersite Program was to provide data that could be used to more thoroughly evaluate and improve air quality models, and then have those models used to address both scientific and policy-related issues dealing with air quality management. In this direction, modeling studies have used Supersites-related data and are reviewed here. Fine temporal resolution data have been used both to test model components (e.g., the inorganic thermodynamic routines) and air quality modeling systems (in particular, Community Multiscale Air Quality [CMAQ] and Comprehensive Air Quality Model with extensions [CAMx] applications). Such evaluations suggest that the inorganic thermodynamic approaches being used are accurate, as well as the description of sulfate production, although there are significant uncertainties in production of nitric acid, biogenic and ammonia emissions, secondary organic aerosol formation, and the ability to follow the formation and evolution of ultrafine particles. Model applications have investigated how PM levels will respond to various emissions controls, suggesting that nitrate will replace some of the reductions in sulfate particulate matter (PM), although the replacement is small in the summer. Although not part of the Supersite program, modeling being conducted by EPA, regional planning organizations, and states for policy purposes has benefited from the detailed data collected, and the PM models have advanced by their more widespread use.

  8. Testing of toxicity based methods to develop site specific clean up objectives - phase 1: Toxicity protocol screening and applicability

    International Nuclear Information System (INIS)

    Hamilton, H.; Kerr, D.; Thorne, W.; Taylor, B.; Zadnik, M.; Goudey, S.; Birkholz, D.

    1994-03-01

    A study was conducted to develop a cost-effective and practical protocol for using bio-assay based toxicity assessment methods for remediation of decommissioned oil and gas production, and processing facilities. The objective was to generate site-specific remediation criteria for contaminated sites. Most companies have used the chemical-specific approach which, however, did not meet the ultimate land use goal of agricultural production. The toxicity assessment method described in this study dealt with potential impairment to agricultural crop production and natural ecosystems. Human health concerns were not specifically addressed. It was suggested that chemical-specific methods should be used when human health concerns exist. . Results showed that toxicity tests will more directly identify ecological stress caused by site contamination than chemical-specific remediation criteria, which can be unnecessarily protective. 11 refs., 7 tabs., 6 figs

  9. Application of the No Action Level (NAL) protocol to correct for prostate motion based on electronic portal imaging of implanted markers

    International Nuclear Information System (INIS)

    Boer, Hans C.J. de; Os, Marjolein J.H. van; Jansen, Peter P.; Heijmen, Ben J.M.

    2005-01-01

    Purpose: To evaluate the efficacy of the No Action Level (NAL) off-line correction protocol in the reduction of systematic prostate displacements as determined from electronic portal images (EPI) using implanted markers. Methods and materials: Four platinum markers, two near the apex and two near the base of the prostate, were implanted for localization purposes in patients who received fractionated high dose rate brachytherapy. During the following course of 25 fractions of external beam radiotherapy, the position of each marker relative to the corresponding position in digitally reconstructed radiographs (DRRs) was measured in EPI in 15 patients for on average 17 fractions per patient. These marker positions yield the composite displacements due to both setup error and internal prostate motion, relative to the planning computed tomography scan. As the NAL protocol is highly effective in reducing systematic errors (recurring each fraction) due to setup inaccuracy alone, we investigated its efficacy in reducing systematic composite displacements. The analysis was performed for the center of mass (COM) of the four markers, as well as for the cranial and caudal markers separately. Furthermore, the impact of prostate rotation on the achieved positioning accuracy was determined. Results: In case of no setup corrections, the standard deviations of the systematic composite displacements of the COM were 3-4 mm in the craniocaudal and anterior-posterior directions, and 2 mm in the left-right direction. The corresponding SDs of the random displacements (interfraction fluctuations) were 2-3 mm in each direction. When applying a NAL protocol based on three initial treatment fractions, the SDs of the systematic COM displacements were reduced to 1-2 mm. Displacements at the cranial end of the prostate were slightly larger than at the caudal end, and quantitative analysis showed this originates from left-right axis rotations about the prostate apex. Further analysis revealed

  10. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  11. On using the dynamic snap-through motion of MEMS initially curved microbeams for filtering applications

    KAUST Repository

    Ouakad, Hassen M.; Younis, Mohammad I.

    2014-01-01

    Numerical and experimental investigations of the dynamics of micromachined shallow arches (initially curved microbeams) and the possibility of using their dynamic snap-through motion for filtering purposes are presented. The considered MEMS arches are actuated by a DC electrostatic load along with an AC harmonic load. Their dynamics is examined numerically using a Galerkin-based reduced-order model when excited near both their first and third natural frequencies. Several simulation results are presented demonstrating interesting jumps and dynamic snap-through behavior of the MEMS arches and their attractive features for uses as band-pass filters, such as their sharp roll-off from pass-bands to stop-bands and their flat response. Experimental work is conducted to test arches realized of curved polysilicon microbeams when excited by DC and AC loads. Experimental data of the micromachined curved beams are shown for the softening and hardening behavior near the first and third natural frequencies, respectively, as well as dynamic snap-through motion. © 2013 Elsevier Ltd.

  12. Radiation initiated grafting of hydrophilic and reactive monomers on polyetherurethane for biomedical application

    International Nuclear Information System (INIS)

    Jansen, B.; Ellinghorst, G.

    1981-01-01

    Hydrogels such poly(hydroxyethylmethacrylate), poly (acrylamide) and poly(2,3-dihydroxypropylmethacrylate) are a class of well-known materials with good to excellent biomedical properties. Unfortunately the mechanical behaviour of the water-swollen gels is poor, and thus their application in pure state is limited. Much work has been done, especially by the grafting technique, on supporting the hydrogels by several techniques in order to improve their mechanical properties. In this work grafting of hydrogel forming or reactive monomers (which can be made hydrophilic by a following chemical process) onto a polyetherurethane was performed by a technique in which the trunk polymer is swollen in the graft monomer before irradiation. (author)

  13. Force application during handcycling and handrim wheelchair propulsion: an initial comparison.

    Science.gov (United States)

    Arnet, Ursina; van Drongelen, Stefan; Veeger, D H; van der Woude L, H V

    2013-12-01

    The aim of the study was to evaluate the external applied forces, the effectiveness of force application and the net shoulder moments of handcycling in comparison with handrim wheelchair propulsion at different inclines. Ten able-bodied men performed standardized exercises on a treadmill at inclines of 1%, 2.5% and 4% with an instrumented handbike and wheelchair that measured three-dimensional propulsion forces. The results showed that during handcycling significantly lower mean forces were applied at inclines of 2.5% (P propulsion. The force effectiveness did not differ between the devices (P = .757); however, the effectiveness did increase with higher inclines during handcycling whereas it stayed constant over all inclines for wheelchair propulsion. The resulting peak net shoulder moments were lower for handcycling compared with wheelchair propulsion at all inclines (P < .001). These results confirm the assumption that handcycling is physically less straining.

  14. Effectiveness of the 'Home-but not Alone' mobile health application educational programme on parental outcomes: a randomized controlled trial, study protocol.

    Science.gov (United States)

    Shorey, Shefaly; Ng, Yvonne Peng Mei; Danbjørg, Dorthe Boe; Dennis, Cindy-Lee; Morelius, Evalotte

    2017-01-01

    The aim of this study was to describe a study protocol that evaluates the effectiveness of the 'Home-but not Alone' educational programme delivered via a mobile health application in improving parenting outcomes. The development in mobile-based technology gives us the opportunity to develop an accessible educational programme that can be potentially beneficial to new parents. However, there is a scarcity of theory-based educational programmes that have incorporated technology such as a mobile health application in the early postpartum period. A randomized controlled trial with a two-group pre-test and post-test design. The data will be collected from 118 couples. Eligible parents will be randomly allocated to either a control group (receiving routine care) or an intervention group (routine care plus access to the 'Home-but not Alone' mobile health application. Outcome measures comprise of parenting self-efficacy, social support, parenting satisfaction and postnatal depression. Data will be collected at the baseline (on the day of discharge) and at four weeks postpartum. This will be an empirical study that evaluates a theory-based educational programme delivered via an innovative mobile health application on parental outcomes. Results from this study will enhance parenting self-efficacy, social support and parenting satisfaction, which may then reduce parental risks of postnatal depression. © 2016 John Wiley & Sons Ltd.

  15. RS Application for conducting change detection within the Sundarban Mangrove Forest, Bangladesh to meet REDD+ initiatives

    Science.gov (United States)

    Biswas, T.; Maus, P.; Megown, K.

    2011-12-01

    The U.S. Forest Service (USFS) provided technical support to the Resource Information Management System (RIMS) unit of the Forest Department (FD) of Bangladesh in developing a method to monitor changes within the Sundarbans Reserve Forest using remote sensing and GIS technology to meet the Reducing Emissions from Deforestation and Degradation (REDD+) initiatives within Bangladesh. It included comparing the simple image differencing method with the Z-score outlier change detection method to examine changes within the mangroves of Bangladesh. Landsat data from three time periods (1989, 1999, 2009) were used to quantify change within four canopy cover classes (High, Medium, Low, and Very Low) within Sundarbans. The Z-score change analysis and image differencing was done for all the 6 reflective bands obtained from Landsat and two spectral indices NDVI and NDMI, derived from these bands for each year. Our results indicated very subtle changes in the mangrove forest within the past twenty years and the Z-score analysis was found to be more useful in capturing these subtle changes than the simple image difference method. Percent change in Z-score of NDVI provided the most meaningful index of vegetation change. It was used to summarize change for the entire study area by pixel, by canopy cover classes and the management compartment during this analysis. Our analysis showed less than 5% overall change in area within the mangroves for the entire study period. Percent change in forest canopy cover reduced from 4% in 1989-99 to 2% by 1999-2009 indicating an increase in forest canopy cover. Percent change in NDVI Z-score of each pixel was used to compute the overall percent change in z-score within the entire study area, mean percent change within each canopy cover class and management compartments from 1989 to 1999 and from 1999 to 2009. The above analysis provided insight to the spatial distribution of percent change in NDVI between the study periods and helped in

  16. Application of Induced Containment Therapy with adapted protocol for home care and its contributions to the motor condition and patient rehabilitation after encephalic vascular accident

    Directory of Open Access Journals (Sweden)

    Daniela Tonús

    2015-09-01

    Full Text Available Introduction: Encephalic Vascular Accident (EVA is among the most important diseases that cause physical and functional limitations. Hemiplegia is the most common physical changes post-EVA, as compromises the upper and lower limbs at the same side of the body, characterized by a rigid pattern of the flexor muscles of the upper limb and the extensor muscles of the lower limb. The Induced Containment Therapy has been a major rehabilitation technique recently aiming to promote functional improvement of the hemiplegic limb of those who suffered EVA and enable performance and quality of life of the individual. Objective: This study aimed to identify the possible contributions of Induced Containment Therapy using a protocol adapted to technique application to the hemiplegic limb. Moreover, this research points out the influence of the environment interventions, which on the present study, occurred in the participant’s home. Method: this is a case study with exploratory feature. Results and Conclusion: The results indicated improvements in functional ability at the time of execution of the tasks and increased use of hemiplegic limb, increasing motor performance after applying the Induced Containment Therapy adapted protocol compared to the start of treatment

  17. The measurement and analysis of normal incidence solar UVB radiation and its application to the photoclimatherapy protocol for psoriasis at the Dead Sea, Israel.

    Science.gov (United States)

    Kudish, Avraham I; Harari, Marco; Evseev, Efim G

    2011-01-01

    The broad-band normal incidence UVB beam radiation has been measured at Neve Zohar, Dead Sea basin, using a prototype tracking instrument composed of a Model 501A UV-Biometer mounted on an Eppley Solar Tracker Model St-1. The diffuse and beam fraction of the solar global UVB radiation have been determined using the concurrently measured solar global UVB radiation. The diffuse fraction was observed to exceed 80% throughout the year. The application of the results of these measurements to the possible revision of the photoclimatherapy protocol for psoriasis patients at the Dead Sea medical spas is now under investigation. The suggested revision would enable the sun-exposure treatment protocol to take advantage of the very high diffuse fraction by allowing the patient to receive the daily dose of UVB radiation without direct exposure to the sun, viz. receive the diffuse UVB radiation under a sunshade. This would require an increase in sun-exposure time intervals, as the UVB radiation intensity beneath a sunshade is less than that on an exposed surface. © 2010 The Authors. Photochemistry and Photobiology © 2010 The American Society of Photobiology.

  18. The Spanish biology/disease initiative within the human proteome project: Application to rheumatic diseases.

    Science.gov (United States)

    Ruiz-Romero, Cristina; Calamia, Valentina; Albar, Juan Pablo; Casal, José Ignacio; Corrales, Fernando J; Fernández-Puente, Patricia; Gil, Concha; Mateos, Jesús; Vivanco, Fernando; Blanco, Francisco J

    2015-09-08

    The Spanish Chromosome 16 consortium is integrated in the global initiative Human Proteome Project, which aims to develop an entire map of the proteins encoded following a gene-centric strategy (C-HPP) in order to make progress in the understanding of human biology in health and disease (B/D-HPP). Chromosome 16 contains many genes encoding proteins involved in the development of a broad range of diseases, which have a significant impact on the health care system. The Spanish HPP consortium has developed a B/D platform with five programs focused on selected medical areas: cancer, obesity, cardiovascular, infectious and rheumatic diseases. Each of these areas has a clinical leader associated to a proteomic investigator with the responsibility to get a comprehensive understanding of the proteins encoded by Chromosome 16 genes. Proteomics strategies have enabled great advances in the area of rheumatic diseases, particularly in osteoarthritis, with studies performed on joint cells, tissues and fluids. In this manuscript we describe how the Spanish HPP-16 consortium has developed a B/D platform with five programs focused on selected medical areas: cancer, obesity, cardiovascular, infectious and rheumatic diseases. Each of these areas has a clinical leader associated to a proteomic investigator with the responsibility to get a comprehensive understanding of the proteins encoded by Chromosome 16 genes. We show how the Proteomic strategy has enabled great advances in the area of rheumatic diseases, particularly in osteoarthritis, with studies performed on joint cells, tissues and fluids. This article is part of a Special Issue entitled: HUPO 2014. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Melt spreading code assessment, modifications, and initial application to the EPR core catcher design

    International Nuclear Information System (INIS)

    Farmer, M.T.; Basu, S.

    2009-01-01

    The Evolutionary Power Reactor (EPR) is a 1,600-MWe Pressurized Water Reactor (PWR) that is undergoing a design certification review by the U.S. Nuclear Regulatory Commission (NRC). The EPR severe accident design philosophy is predicated upon the fact that the projected power rating results in a narrow margin for in-vessel melt retention by external flooding. As a result, the design addresses ex-vessel core melt stabilization using a mitigation strategy that includes: 1) an external core melt retention system to temporarily hold core melt released from the vessel; 2) a layer of 'sacrificial' material that is admixed with the melt while in the core melt retention system; 3) a melt plug that, when failed, provides a pathway for the mixture to spread to a large core spreading chamber; and finally, 4) cooling and stabilization of the spread melt by controlled top and bottom flooding. The melt spreading process relies heavily on inertial flow of a low-viscosity admixed melt to a segmented spreading chamber, and assumes that the melt mass will be distributed to a uniform height in the chamber. The spreading phenomenon thus needs to be modeled properly in order to adequately assess the EPR design. The MELTSPREAD code, developed at Argonne National Laboratory, can model segmented, and both uniform and non-uniform spreading. The NRC is using MELTSPREAD to evaluate melt spreading in the EPR design. The development of MELTSPREAD ceased in the early 1990's, and so the code was first assessed against the more contemporary spreading database and code modifications, as warranted, were carried out before performing confirmatory plant calculations. This paper provides principle findings from the MELTSPREAD assessment activities and resulting code modifications, and also summarizes the results of initial scoping calculations for the EPR plant design and preliminary plant analyses, along with the plan for performing the final set of plant calculations including sensitivity studies

  20. Reflection on Mobile Applications for Blood Pressure Management: A Systematic Review on Potential Effects and Initiatives.

    Science.gov (United States)

    Mohammadi, Reyhaneh; Ayatolahi Tafti, Movahhedeh; Hoveidamanesh, Soodabeh; Ghanavati, Reza; Pournik, Omid

    2018-01-01

    Ischemic heart disease and stroke have been considered as the first global leading cause of death in last decades [1]. Blood pressure (BP) management is one of the easiest ways suggested for preventing and controlling cardiovascular diseases before the patient develops complications and death-following outcomes. Appearance of technology advancements in the health system has motivated researchers and health providers to study its different aspects and applications in order to improve disease prevention and management. Following these efforts, mobile health (mHealth) technologies were presented to provide people with fast and easier-to-use services. Although there are some unsolved challenges, these technologies have become popular among many people. As an important part of mHealth, mobile applications (apps) have been the focused subject of many studies in the last decade. The objective of this systematic review is to assess the potential effects of mobile apps designed for BP management by scrutinizing the related studies. Search methods: We searched the following electronic databases in December 2016: Medline (PubMed), National Center for Biotechnology Information (NCBI), Cochrane Central Register of Controlled Trials (CENTRAL), PsycINFO, Cumulative Index to Nursing and Allied Health Literature (CINAHL), Education Resources Information Center(ERIC), Web of Science, ProQuest, and Google Scholar. No language restriction and start point limitation were imposed. We included studies that evaluated and assessed mobile apps for BP management and related clinical trials that considered mobile app as the only difference between intervention and control groups. Two review authors applied the eligibility criteria, extracted data and assessed the quality of included studies. Literature search resulted in 13 included studies and 27 reviews. 12 records of 13 included studies identified as interventional studies. The review showed that the mobile apps may improve individual's BP

  1. Concentrations of and application protocols for hydrogen peroxide bleaching gels: effects on pulp cell viability and whitening efficacy.

    Science.gov (United States)

    Soares, Diana Gabriela; Basso, Fernanda Gonçalves; Hebling, Josimeri; de Souza Costa, Carlos Alberto

    2014-02-01

    To assess the whitening effectiveness and the trans-enamel/trans-dentinal toxicity of experimental tooth-bleaching protocols on pulp cells. Enamel/dentine discs individually adapted to trans-well devices were placed on cultured odontoblast-like cells (MDPC-23) or human dental pulp cells (HDPCs). The following groups were formed: G1 - no treatment (control); G2 to G4 - 35% H2O2, 3 × 15, 1 × 15, and 1 × 5 min, respectively; and G5 to G7 - 17.5% H2O2, 3 × 15, 1 × 15, and 1 × 5 min, respectively. Cell viability and morphology were evaluated immediately after bleaching (T1) and 72 h thereafter (T2). Oxidative stress and cell membrane damage were also assessed (T1). The amount of H2O2 in culture medium was quantified (Mann-Whitney; α=5%) and colour change (ΔE) of enamel was analysed after 3 sessions (Tukey's test; α=5%). Cell viability reduction, H2O2 diffusion, cell morphology alteration, oxidative stress, and cell membrane damage occurred in a concentration-/time-dependent fashion. The cell viability reduction was significant in all groups for HDPCs and only for G2, G3, and G5 in MDPC-23 cells compared with G1. Significant cell viability and morphology recovery were observed in all groups at T2, except for G2 in HDPCs. The highest ΔE value was found in G2. However, all groups presented significant ΔE increases compared with G1. Shortening the contact time of a 35%-H2O2 gel for 5 min, or reducing its concentration to 17.5% and applying it for 45, 15, or 5 min produce gradual tooth colour change associated with reduced trans-enamel and trans-dentinal cytotoxicity to pulp cells. The experimental protocols tested in the present study provided significant tooth-bleaching improvement associated with decreased toxicity to pulp cells, which may be an interesting alternative to be tested in clinical situations intended to reduce tooth sensitivity and pulp damage. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Addressing the coming radiology crisis-the Society for Computer Applications in Radiology transforming the radiological interpretation process (TRIP) initiative.

    Science.gov (United States)

    Andriole, Katherine P; Morin, Richard L; Arenson, Ronald L; Carrino, John A; Erickson, Bradley J; Horii, Steven C; Piraino, David W; Reiner, Bruce I; Seibert, J Anthony; Siegel, Eliot

    2004-12-01

    The Society for Computer Applications in Radiology (SCAR) Transforming the Radiological Interpretation Process (TRIP) Initiative aims to spearhead research, education, and discovery of innovative solutions to address the problem of information and image data overload. The initiative will foster interdisciplinary research on technological, environmental and human factors to better manage and exploit the massive amounts of data. TRIP will focus on the following basic objectives: improving the efficiency of interpretation of large data sets, improving the timeliness and effectiveness of communication, and decreasing medical errors. The ultimate goal of the initiative is to improve the quality and safety of patient care. Interdisciplinary research into several broad areas will be necessary to make progress in managing the ever-increasing volume of data. The six concepts involved are human perception, image processing and computer-aided detection (CAD), visualization, navigation and usability, databases and integration, and evaluation and validation of methods and performance. The result of this transformation will affect several key processes in radiology, including image interpretation; communication of imaging results; workflow and efficiency within the health care enterprise; diagnostic accuracy and a reduction in medical errors; and, ultimately, the overall quality of care.

  3. Application of quality-improvement methods in a community practice: the Sandhills Pediatrics Asthma Initiative.

    Science.gov (United States)

    Wroth, Thomas H; Boals, Joseph C

    2005-01-01

    leadership and support. The leaders of the practice saw beyond the usual metrics of patient visit counts and relative value units (RVUs) to embrace the concept of population health: the notion that practices are not only responsible for providing acute, episodic care in the office, but also for improving health outcomes in the community in which they serve. Other important factors included ensuring a basic agreement among providers on the need for improvement and frequent communication about the goals of the project. Although the champions of the project tried to minimize formal meeting time, there was frequent informal communication between team members. In the future, there is a need to develop other approaches to stimulate these endeavors in community practices, such as "pay for performance" programs, continuing education credit, and tying maintenance of board certification to quality improvement initiatives.

  4. An overview of coal preparation initiatives with application to coal conversion in South Africa

    International Nuclear Information System (INIS)

    Reinecke, C.F.; Bunt, J.R.

    1999-01-01

    in heating value, making then more suitable for use in power generation. From the foregoing it is clear that initiatives are currently underway in South Africa aimed at more effectively managing coal resources by maximizing the utilization potential thereof. It is the purpose of this paper to present an overview of Sasol's efforts aimed at more-effectively managing their coal resources, with particular emphasis on coal preparation

  5. Uniform implantation of CNTs on total activated carbon surfaces: a smart engineering protocol for commercial supercapacitor applications.

    Science.gov (United States)

    Jiang, Jian; Li, Linpo; Liu, Yani; Liu, Siyuan; Xu, Maowen; Zhu, Jianhui

    2017-04-07

    The main obstacles to building better supercapacitors are still trade-offs between energy and power parameters. To promote commercial supercapacitor behaviors, proper optimization toward electrode configurations/architectures may be a feasible and effective way. We herein propose a smart and reliable electrode engineering protocol, by in situ implantation of carbon nanotubes (CNTs) on total activated carbon (AC) surfaces via a mild chemical vapor deposition process at ∼550 °C, using nickel nitrate hydroxide (NNH) thin films and waste ethanol solvents as the catalyst and carbon sources, respectively. The direct and conformal growth of NNH layers onto carbonaceous scaffold guarantees the later uniform implantation of long and high-quality CNTs on total AC outer surfaces. Such fluffy and entangled CNTs preserve ionic diffusion channels, well connect neighboring ACs and function as superhighways for electrons transfer, endowing electrodes with outstanding capacitive behaviors including large output capacitances of ∼230 F g -1 in 1 M Na 2 SO 4 neutral solution and ∼502.5 F g -1 in 6 M KOH using Ni valence state variation, and very negligible capacity decay in long-term cycles. Furthermore, a full symmetric supercapacitor device of CNTs@ACs//CNTs@ACs has been constructed, capable of delivering both high specific energy and power densities (maximum values reaching up to ∼97.2 Wh kg -1 and ∼10.84 kW kg -1 ), which holds great potential in competing with current mainstream supercapacitors.

  6. Application of a protocol for magnetic resonance spectroscopy of adrenal glands: an experiment with over 100 cases.

    Science.gov (United States)

    Melo, Homero José de Farias E; Goldman, Suzan M; Szejnfeld, Jacob; Faria, Juliano F; Huayllas, Martha K P; Andreoni, Cássio; Kater, Cláudio E

    2014-01-01

    To evaluate a protocol for two-dimensional (2D) hydrogen proton (1H) magnetic resonance spectroscopy (MRS) (Siemens Medical Systems; Erlangen, Germany) in the detection of adrenal nodules and differentiation between benign and malignant masses (adenomas, pheochromocytomas, carcinomas and metastases). A total of 118 patients (36 men; 82 women) (mean age: 57.3 ± 13.3 years) presenting with 138 adrenal nodules/masses were prospectively assessed. A multivoxel system was utilized with a 2D point-resolved spectroscopy/chemical shift imaging sequence. The following ratios were calculated: choline (Cho)/creatine (Cr), 4.0-4.3/Cr, lipid (Lip)/Cr, Cho/Lip and lactate (Lac)/Cr. 2D-1H-MRS was successful in 123 (89.13%) lesions. Sensitivity and specificity values observed for the ratios and cutoff points were the following: Cho/Cr ≥ 1.2, 100% sensitivity, 98.2% specificity (differences between adenomas/pheochromocytomas and carcinomas/ metastases); 4.0-4.3 ppm/Cr ≥ 1.5, 92.3% sensitivity, 96.9% specificity (differences between carcinomas/pheochromocytomas and adenomas/metastases); Lac/Cr ≤ -7.449, 90.9% sensitivity and 77.8% specificity (differences between pheochromocytomas and carcinomas/adenomas). Information provided by 2D-1H-MRS were effective and allowed for the differentiation between adrenal masses and nodules in most cases of lesions with > 1.0 cm in diameter.

  7. Can simple mobile phone applications provide reliable counts of respiratory rates in sick infants and children? An initial evaluation of three new applications.

    Science.gov (United States)

    Black, James; Gerdtz, Marie; Nicholson, Pat; Crellin, Dianne; Browning, Laura; Simpson, Julie; Bell, Lauren; Santamaria, Nick

    2015-05-01

    Respiratory rate is an important sign that is commonly either not recorded or recorded incorrectly. Mobile phone ownership is increasing even in resource-poor settings. Phone applications may improve the accuracy and ease of counting of respiratory rates. The study assessed the reliability and initial users' impressions of four mobile phone respiratory timer approaches, compared to a 60-second count by the same participants. Three mobile applications (applying four different counting approaches plus a standard 60-second count) were created using the Java Mobile Edition and tested on Nokia C1-01 phones. Apart from the 60-second timer application, the others included a counter based on the time for ten breaths, and three based on the time interval between breaths ('Once-per-Breath', in which the user presses for each breath and the application calculates the rate after 10 or 20 breaths, or after 60s). Nursing and physiotherapy students used the applications to count respiratory rates in a set of brief video recordings of children with different respiratory illnesses. Limits of agreement (compared to the same participant's standard 60-second count), intra-class correlation coefficients and standard errors of measurement were calculated to compare the reliability of the four approaches, and a usability questionnaire was completed by the participants. There was considerable variation in the counts, with large components of the variation related to the participants and the videos, as well as the methods. None of the methods was entirely reliable, with no limits of agreement better than -10 to +9 breaths/min. Some of the methods were superior to the others, with ICCs from 0.24 to 0.92. By ICC the Once-per-Breath 60-second count and the Once-per-Breath 20-breath count were the most consistent, better even than the 60-second count by the participants. The 10-breath approaches performed least well. Users' initial impressions were positive, with little difference between the

  8. Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed on 26 May 2008 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the Republic of Montenegro written notification that Montenegro's statutory and constitutional requirements for entry into force had been met

  9. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 21 April 2011, the date on which the Agency received from the Kingdom of Morocco written notification that Morocco's statutory and constitutional requirements for entry into force had been met

  10. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  11. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  12. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-12

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met.

  13. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met [es

  14. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-07

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met.

  15. Protocol Additional to the agreement between the Republic of Chile and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-12-23

    The text of the Protocol Additional to the Agreement between the Republic of Chile and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 19 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 November 2003, the date on which the Agency received from Chile written notification that Chile's statutory and/or constitutional requirements for entry into force had been met.

  16. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-11

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met.

  17. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-02-23

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met.

  18. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met

  19. Protocol Additional to the agreement between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 28 September 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from the Czech Republic written notification that the Czech Republic's statutory and/or constitutional requirements for entry into force have been met, i.e. on 1 July 2002

  20. Protocol Additional to the agreement between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 5 July 2000. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Azerbaijan written notification that Azerbaijan's statutory and/or constitutional requirements for entry into force have been met, i.e. on 29 November 2000

  1. Protocol Additional to the agreement between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Canada written notification that Canada's statutory and/or constitutional requirements for entry into force have been met, i.e. on 8 September 2000

  2. Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 22 November 2007. It was signed on 23 June 2010 in Lisbon, Portugal, and on 8 July 2010 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 March 2011, the date on which the Agency received from the Republic of Mozambique written notification that Mozambique's statutory and constitutional requirements for entry into force had been met

  3. Protocol Additional to the agreement between the Union of the Comoros and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Union of the Comoros and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed in Vienna on 13 December 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 January 2009, the date on which the Agency received from the Union of the Comoros written notification that Comoros' statutory and constitutional requirements for entry into force had been met

  4. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [fr

  5. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  6. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  7. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  8. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  9. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met

  10. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  11. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met [es

  12. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met. [es

  13. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [es

  14. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  15. Protocol Additional to the agreement between the Republic of Chile and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Chile and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 19 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 November 2003, the date on which the Agency received from Chile written notification that Chile's statutory and/or constitutional requirements for entry into force had been met

  16. Application of a high-level peracetic acid disinfection protocol to re-process antibiotic disinfected skin allografts.

    Science.gov (United States)

    Lomas, R J; Huang, Q; Pegg, D E; Kearney, J N

    2004-01-01

    Skin allografts, derived from cadaveric donors, are widely used for the treatment of burns and ulcers. Prior to use in clinical situations, these allografts are disinfected using a cocktail of antibiotics and then cryopreserved. Unfortunately, this antibiotic disinfection procedure fails to decontaminate a significant proportion and these contaminated grafts can not be used clinically. We have investigated whether it is possible to apply a second, more potent disinfection procedure to these contaminated grafts and effectively to re-process them for clinical use. Cadaveric skin grafts, treated with antibiotics and cryopreserved, were thawed and a peracetic acid (PAA) disinfection protocol applied. The grafts were then preserved in a high concentration of glycerol or propylene glycol, and properties thought to be essential for successful clinical performance assessed. The cytotoxicity of the grafts was assessed using both extract and contact assays; damage to the skin collagen was assessed using a collagenase susceptibility assay and the capacity of the grafts to elicit an inflammatory response in vitro was assessed by quantifying the production of the pro-inflammatory cytokine TNF-alpha by human peripheral blood mononuclear phagocytes. PAA disinfection, in conjunction with either glycerol or propylene glycol preservation, did not render the grafts cytotoxic, pro-inflammatory, or increase their susceptibility to collagenase digestion. The rates of penetration of glycerol and propylene glycol into the re-processed skin were comparable to those of fresh skin. This study has demonstrated that PAA disinfection combined with immersion in high concentrations of either glycerol or propylene glycol was an effective method for re-processing contaminated skin allografts, and may justify their clinical use.

  17. Treatment for TMD with occlusal splint and electromyographic control: application of the FARC protocol in a Brazilian population.

    Science.gov (United States)

    Vieira e Silva, Carolina A; da Silva, Marco Antônio M Rodrigues; Melchior, Melissa de Oliveira; de Felício, Cláudia Maria; Sforza, Chiarella; Tartaglia, Gianluca M

    2012-07-01

    The purpose of this study was to apply Functional Anatomy Research Center (FARC) Protocol of TMD treatment, which includes the use of a specific type of mandibular occlusal splint, adjusted based on the electromyographic index, in a group of 15 patients with disc displacement, classified according to the Research Diagnostic Criteria for Temporomandibular Disorders (RDC/TMD) and then analyzing the results compared with the control group. The clinical evaluations were completed both before and after the treatment. Electromyographic (EMG) data was collected and recorded on the day the splint was inserted (visit 1), after one week (visit 2) and after five weeks of treatment (visit 3). The control group consisted of 15 asymptomatic subjects, according to the same diagnostic criteria (RDC/TMD), who were submitted to the same evaluations with the same interval periods as the treatment group. Immediately after splint adjustment, masseter muscle symmetry and total muscular activity were significantly different with than without the splint (p < 0.05), showing an increased neuromuscular coordination. After treatment, significant variations (p < .05) were found in mouth opening and in pain remission. There were no significant differences among the three sessions, either with or without the splint. There were significant differences between the TMD and control groups for all analyzed indices of muscular symmetry, activity and torque, with the exception of total muscular activity. The use of the splint promoted balance of the EMG activities during its use, relieving symptoms. EMG parameters identified neuromuscular imbalance, and allowed an objective analysis of different phases of TMD treatment, differentiating individuals with TMD from the asymptomatic subjects.

  18. Preparation and controlled drug delivery applications of mesoporous silica polymer nanocomposites through the visible light induced surface-initiated ATRP

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Long; Liu, Meiying; Mao, Liucheng; Xu, Dazhuang; Wan, Qing; Zeng, Guangjian; Shi, Yingge [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wen, Yuanqing, E-mail: m18600788382@163.com [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Zhang, Xiaoyong, E-mail: xiaoyongzhang1980@gmail.com [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wei, Yen, E-mail: weiyen@tsinghua.edu.cn [Department of Chemistry and The Tsinghua Center for Frontier Polymer Research, Tsinghua University, Beijing, 100084 (China)

    2017-08-01

    Graphical abstract: A novel strategy for surface PEGylation of mesoporous silica nanoparticles was developed based on the light induced surface-initiated atom transfer radical polymerization. - Highlights: • Surface modification of silica nanoparticles through light induced surface-initiated ATRP. • MSNs-NH{sub 2}-poly(IA-co-PEGMA) nanocomposites show high water dispersity. • MSNs-NH{sub 2}-poly(IA-co-PEGMA) nanocomposites are promising for biomedical applications. • The light induced ATRP possesses many advantages as compared with traditional ATRP. - Abstract: The mesoporous materials with large pore size, high specific surface area and high thermal stability have been widely utilized in a variety of fields ranging from environmental remediation to separation and biomedicine. However, surface modification of these silica nanomaterials is required to endow novel properties and achieve better performance for most of these applications. In this work, a new method has been established for surface modification of mesoporous silica nanoparticles (MSNs) that relied on the visible light induced atom transfer radical polymerization (ATRP). In the procedure, the copolymers composited with itaconic acid (IA) and poly(ethylene glycol)methyl acrylate (PEGMA) were grafted from MSNs using IA and PEGMA as the monomers and 10-Phenylphenothiazine(PTH) as the organic catalyst. The successful preparation of final polymer nanocomposites (named as MSNs-NH{sub 2}-poly(IA-co-PEGMA)) were evidenced by a series of characterization techniques. More importantly, the anticancer agent cisplatin can be effectively loaded on MSNs-NH{sub 2}-poly(IA-co-PEGMA) and controlled release it from the drug-loading composites with pH responsive behavior. As compared with conventional ATRP, the light induced surface-initiated ATRP could also be utilized for preparation of various silica polymer nanocomposites under rather benign conditions (e.g. absent of transition metal ions, low polymerization

  19. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life using a Smartphone Application

    Directory of Open Access Journals (Sweden)

    Silvana Mareva

    2016-07-01

    Full Text Available Health-Related Quality of Life (HRQoL is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money travelling to receive assessment. Ecological Momentary Assessment (EMA is an alternative, as mobile assessment using mobile health (mHealth technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 420 students from seven different universities across Europe. Participants will be prompted by the application to report their real-time HRQoL over two weeks together with information on mood and current activities. At the end of two weeks, students will complete a retrospective assessment of their HRQoL and provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same two-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g. mood, activities, the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for

  20. Study Protocol on Ecological Momentary Assessment of Health-Related Quality of Life Using a Smartphone Application.

    Science.gov (United States)

    Mareva, Silvana; Thomson, David; Marenco, Pietro; Estal Muñoz, Víctor; Ott, Caroline V; Schmidt, Barbara; Wingen, Tobias; Kassianos, Angelos P

    2016-01-01

    Health-Related Quality of Life (HRQoL) is a construct of increasing importance in modern healthcare, and has typically been assessed using retrospective instruments. While such measures have been shown to have predictive utility for clinical outcomes, several cognitive biases associated with human recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2 weeks, they will complete a retrospective assessment of their HRQoL and they will provide information about their sleep quality and perceived stress. The psychometric properties of real-time HRQoL will be assessed, including analysis of the factorial structure, reliability and validity of the measure, and compared with retrospective HRQoL responses for the same 2-week testing period. Further, we aim to identify factors associated with real-time HRQoL (e.g., mood, activities), the feasibility of the application, and within- and between-person variability in real-time HRQoL. We expect real-time HRQoL to have adequate validity and reliability, and positive responses on the feasibility of using a smartphone application for routine HRQoL assessment. The direct comparison of real

  1. Study protocol on ecological momentary assessment of health-related quality of life using a smartphone application

    DEFF Research Database (Denmark)

    Mareva, Silvana; Thomson, David M; Marenco, Pietro

    2016-01-01

    recall and current mood state may undermine their validity and reliability. Retrospective tools can be further criticized for their lack of ecology, as individuals are usually assessed in less natural settings such as hospitals and health centers, and may be obliged to spend time and money traveling...... to receive assessment. Ecological momentary assessment (EMA) is an alternative, as mobile assessment using mobile health (mHealth) technology has the potential to minimize biases and overcome many of these limitations. Employing an EMA methodology, we will use a smartphone application to collect data on real-time...... HRQoL, with an adapted version of the widely used WHOQOL-BREF questionnaire. We aim to recruit a total of 450 healthy participants. Participants will be prompted by the application to report their real-time HRQoL over 2 weeks together with information on mood and current activities. At the end of 2...

  2. Initial idea to use optical flats for x-ray fluorescence analysis and recent applications to diffraction studies

    International Nuclear Information System (INIS)

    Horiuchi, T.

    1993-01-01

    Described in this work is the initial idea of using an optical flat for X-ray fluorescence analysis based upon studies of anomalous surface reflection (ASR). To develop total-reflection X-ray fluorescence analysis (TXRF) as one of the most powerful tools for microchemical analysis, various experiments such as the micro-determinations of uranium in sea-water, iron in human blood and rare earth elements in hot spring-water were attempted. Furthermore, the physically interesting experiment on Compton scattering under total-reflection conditions was conducted. Recent applications of the total-reflection phenomenon to diffraction studies, i.e. total-reflection X-ray diffraction (TXRD), are also presented. (author)

  3. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  4. The effect of mobile application interventions on influencing healthy maternal behaviour and improving perinatal health outcomes: a systematic review protocol.

    Science.gov (United States)

    Daly, Lisa M; Horey, Dell; Middleton, Philippa F; Boyle, Frances M; Flenady, Vicki

    2017-02-08

    Perinatal morbidity and mortality remain significant public health issues globally, with enduring impact on the health and well-being of women and their families. Pregnant women who adopt, practice and maintain healthy behaviours can potentially improve the health of themselves and their babies. Mobile applications are an increasingly popular mode of accessing, storing and sharing health information among pregnant women. The main objective of this review is to evaluate the effects of mobile application interventions during pregnancy on maternal behaviour and associated maternal and infant outcomes. This review will include randomised and non-randomised studies which tested use of mobile applications designed to improve either maternal knowledge or behaviours to address known risk factors associated with adverse perinatal health outcomes. This review will include studies which included pregnant women and/or women during birth. The search strategy will utilise a combination of keywords and MeSH terms. Literature databases such as PubMed, Embase, The Cochrane Library, CINAHL and WHO Global Health Library will be searched. Two reviewers will independently screen retrieved citations to determine if they meet inclusion criteria. Studies will be selected that provide information about interventions commenced in early pregnancy, late pregnancy or labour. Comparisons to be made include mobile applications versus interventions relying on paper-based or text-messaging-based communication; interpersonal communication such as face-to-face or telephone conversation; and no intervention or standard care. Quality assessment of included randomised studies will utilise established guidelines provided in the Cochrane Handbook for Systematic Reviews of Interventions. Quality assessment of non-randomised studies will be based on the Risk of Bias in Non-randomised Studies-of Interventions (ROBINS-I) assessment tool. Quality of the evidence will be evaluated using the Grades of

  5. Protocol for an electrospray ionization tandem mass spectral product ion library: development and application for identification of 240 pesticides in foods.

    Science.gov (United States)

    Zhang, Kai; Wong, Jon W; Yang, Paul; Hayward, Douglas G; Sakuma, Takeo; Zou, Yunyun; Schreiber, André; Borton, Christopher; Nguyen, Tung-Vi; Kaushik, Banerjee; Oulkar, Dasharath

    2012-07-03

    Modern determination techniques for pesticides must yield identification quickly with high confidence for timely enforcement of tolerances. A protocol for the collection of liquid chromatography (LC) electrospray ionization (ESI)-quadruple linear ion trap (Q-LIT) mass spectrometry (MS) library spectra was developed. Following the protocol, an enhanced product ion (EPI) library of 240 pesticides was developed by use of spectra collected from two laboratories. A LC-Q-LIT-MS workflow using scheduled multiple reaction monitoring (sMRM) survey scan, information-dependent acquisition (IDA) triggered collection of EPI spectra, and library search was developed and tested to identify the 240 target pesticides in one single LC-Q-LIT MS analysis. By use of LC retention time, one sMRM survey scan transition, and a library search, 75-87% of the 240 pesticides were identified in a single LC/MS analysis at fortified concentrations of 10 ng/g in 18 different foods. A conventional approach with LC-MS/MS using two MRM transitions produced the same identifications and comparable quantitative results with the same incurred foods as the LC-Q-LIT using EPI library search, finding 1.2-49 ng/g of either carbaryl, carbendazim, fenbuconazole, propiconazole, or pyridaben in peaches; carbendazim, imazalil, terbutryn, and thiabendazole in oranges; terbutryn in salmon; and azoxystrobin in ginseng. Incurred broccoli, cabbage, and kale were screened with the same EPI library using three LC-Q-LIT and a LC-quadruple time-of-flight (Q-TOF) instruments. The library search identified azoxystrobin, cyprodinil, fludioxinil, imidacloprid, metalaxyl, spinosyn A, D, and J, amd spirotetramat with each instrument. The approach has a broad application in LC-MS/MS type targeted screening in food analysis.

  6. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  7. Validation of a standard forensic anthropology examination protocol by measurement of applicability and reliability on exhumed and archive samples of known biological attribution.

    Science.gov (United States)

    Francisco, Raffaela Arrabaça; Evison, Martin Paul; Costa Junior, Moacyr Lobo da; Silveira, Teresa Cristina Pantozzi; Secchieri, José Marcelo; Guimarães, Marco Aurelio

    2017-10-01

    Forensic anthropology makes an important contribution to human identification and assessment of the causes and mechanisms of death and body disposal in criminal and civil investigations, including those related to atrocity, disaster and trafficking victim identification. The methods used are comparative, relying on assignment of questioned material to categories observed in standard reference material of known attribution. Reference collections typically originate in Europe and North America, and are not necessarily representative of contemporary global populations. Methods based on them must be validated when applied to novel populations. This study describes the validation of a standardized forensic anthropology examination protocol by application to two contemporary Brazilian skeletal samples of known attribution. One sample (n=90) was collected from exhumations following 7-35 years of burial and the second (n=30) was collected following successful investigations following routine case work. The study presents measurement of (1) the applicability of each of the methods: used and (2) the reliability with which the biographic parameters were assigned in each case. The results are discussed with reference to published assessments of methodological reliability regarding sex, age and-in particular-ancestry estimation. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Wifi, WiMax and LTE multi-hop mesh networks basic communication protocols and application areas

    CERN Document Server

    Wei, Hung-Yu; Dixit, Sudhir

    2013-01-01

    Wifi, WiMAX, and Cellular Multihop Networks presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in

  9. Nursing Telehealth Applications Initiative

    Science.gov (United States)

    2011-01-01

    promotion, diagnosis, consultation, education, and/or therapy " (5). Telehealth encompasses videoconferencing, transmission of still images, e-health, remote...one 16 ounce chocolate milkshake at McDonalds has 580 calories and 102 grams of carbohydrate, one Minute Maid apple juice box has 90 calories and

  10. Mobile Application to Promote Adherence to Oral Chemotherapy and Symptom Management: A Protocol for Design and Development.

    Science.gov (United States)

    Fishbein, Joel Nathan; Nisotel, Lauren Ellen; MacDonald, James John; Amoyal Pensak, Nicole; Jacobs, Jamie Michele; Flanagan, Clare; Jethwani, Kamal; Greer, Joseph Andrew

    2017-04-20

    symptoms and side effects. At every stage in this trial, we are engaging stakeholders to solicit feedback on our progress and next steps. To our knowledge, we are the first to describe the development of an app designed for people taking oral chemotherapy. The app addresses many concerns with oral chemotherapy, such as medication adherence and symptom management. Soliciting feedback from stakeholders with broad perspectives and expertise ensured that the app was acceptable and potentially beneficial for patients, caregivers, and clinicians. In our development process, we instantiated 7 of the 8 best practices proposed in a recent review of mobile health app development. Our process demonstrated the importance of effective communication between research groups and technical teams, as well as meticulous planning of technical specifications before development begins. Future efforts should consider incorporating other proven strategies in software, such as gamification, to bolster the impact of mobile health apps. Forthcoming results from our randomized controlled trial will provide key data on the effectiveness of this app in improving medication adherence and symptom management. ClinicalTrials.gov NCT02157519; https://clinicaltrials.gov/ct2/show/NCT02157519 (Archived by WebCite at http://www.webcitation.org/6prj3xfKA). ©Joel Nathan Fishbein, Lauren Ellen Nisotel, James John MacDonald, Nicole Amoyal Pensak, Jamie Michele Jacobs, Clare Flanagan, Kamal Jethwani, Joseph Andrew Greer. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 20.04.2017.

  11. Preparation and controlled drug delivery applications of mesoporous silica polymer nanocomposites through the visible light induced surface-initiated ATRP

    Science.gov (United States)

    Huang, Long; Liu, Meiying; Mao, Liucheng; Xu, Dazhuang; Wan, Qing; Zeng, Guangjian; Shi, Yingge; Wen, Yuanqing; Zhang, Xiaoyong; Wei, Yen

    2017-08-01

    The mesoporous materials with large pore size, high specific surface area and high thermal stability have been widely utilized in a variety of fields ranging from environmental remediation to separation and biomedicine. However, surface modification of these silica nanomaterials is required to endow novel properties and achieve better performance for most of these applications. In this work, a new method has been established for surface modification of mesoporous silica nanoparticles (MSNs) that relied on the visible light induced atom transfer radical polymerization (ATRP). In the procedure, the copolymers composited with itaconic acid (IA) and poly(ethylene glycol)methyl acrylate (PEGMA) were grafted from MSNs using IA and PEGMA as the monomers and 10-Phenylphenothiazine(PTH) as the organic catalyst. The successful preparation of final polymer nanocomposites (named as MSNs-NH2-poly(IA-co-PEGMA)) were evidenced by a series of characterization techniques. More importantly, the anticancer agent cisplatin can be effectively loaded on MSNs-NH2-poly(IA-co-PEGMA) and controlled release it from the drug-loading composites with pH responsive behavior. As compared with conventional ATRP, the light induced surface-initiated ATRP could also be utilized for preparation of various silica polymer nanocomposites under rather benign conditions (e.g. absent of transition metal ions, low polymerization temperature and short polymerization time). Taken together, we have developed a rather promising strategy method for fabrication of multifunctional MSNs-NH2-poly(IA-co-PEGMA) with great potential for biomedical applications.

  12. Nursing Students' Opinion on the Use of Smartphone Applications (Apps) in Clinical Education and Training: A Study Protocol.

    Science.gov (United States)

    O'Connor, Siobhan; Andrews, Tom

    2016-01-01

    Nurse educators are exploring different mobile technologies to provide additional support to nursing students in clinical practice. However, the view of nursing students on the use of smartphone applications (apps) to enhance clinical education has not been explored. This proposed study will use a self-reported questionnaire to examine the opinions of nursing students on the current and potential use of smartphone apps when training in clinical settings. Descriptive and inferential statistics will be performed on the quantitative data. Qualitative data from open ended questions will be thematically analysed using the framework approach. This will be the first study to examine the use of smartphone apps as a support in clinical teaching from a students' perspective. Their opinion is vital if the right mobile technology is to be designed and implemented.

  13. Ecological momentary assessment and smartphone application intervention in adolescents with substance use and comorbid severe psychiatric disorders: study protocol

    Directory of Open Access Journals (Sweden)

    Xavier Benarous

    2016-09-01

    Full Text Available Context: Substance Use Disorders (SUDs are highly prevalent among inpatient adolescents with psychiatric disorders. In this population, substance use and other psychiatric outcomes can reinforce one another. Despite the need for integrated interventions in youths with dual diagnoses, few specific instruments are available. App-based technologies have shown promising results to help reduce substance use in adolescents, but their applicability in youths with associated severe psychiatric disorders is poorly documented. We aim to evaluate the feasibility of an ecological momentary assessment (EMA intervention for all substance users, and of a smart-phone application for cannabis users (Stop-Cannabis, for outpatient treatment after hospital discharge. Methods and analysis: All inpatient adolescents with psychiatric disorders hospitalized between 2016 and 2018 in a university hospital will be systematically screened for SUD and, if positive, will be assessed by an independent specialist addiction team. Participants with confirmed SUDs will be invited and helped to download an EMA app and, if required, the Stop-Cannabis app the week preceding hospital discharge. Information about the acceptability and use of both apps and the validity of EMA data in comparison to clinical assessments will be assessed after 6 months and one year.Discussion: This research has been designed to raise specific issues for consideration regarding the sequence between substance use, contextual factors, and other psychiatric symptoms among adolescents with comorbid severe psychiatric disorders. A better understanding of the mechanisms involved will inform the development of integrated treatment for dual disorders at that age.Ethics and dissemination: The study has already been approved and granted. Dissemination will include presentations at international congresses as well as publications in peer-reviewed journals.Trial registration: European Clinical Trials Database: Number

  14. Application of mine water leaching protocol on coal fly ash to assess leaching characteristics for suitability as a mine backfill material.

    Science.gov (United States)

    Madzivire, Godfrey; Ramasenya, Koena; Tlowana, Supi; Coetzee, Henk; Vadapalli, Viswanath R K

    2018-04-16

    Over the years, coal mining in the Mpumalanga Province of South Africa has negatively affected the environment by causing pollution of water resources, land subsidence and spontaneous coal combustion. Previous studies show that in-situ treatment of acid mine drainage (AMD) using coal fly ash (CFA) from local power stations was possible and sludge recovered out of such treatment can be used to backfill mines. In this article, the authors have attempted to understand the leaching characteristics of CFA when placed underground as a backfill material using the mine water leaching protocol (MWLP). The results show that the migration of contaminants between the coal fly ash and the AMD in the mine voids depends on the pH and quality of the mine water. While backfilling mine voids with CFA can neutralize and scavenge between 50% and 95% of certain environmentally sensitive elements from AMD such as Fe, Al, Zn, Cu, Ni, Co and Mn. At this moment, it is also important to point out that certain scavenged/removed contaminants from the AMD during initial phases of backfilling can be remobilized by the influx of acidic water into the mine voids. It has therefore been concluded that, while CFA can be used to backfill mine voids, the influx of fresh acidic mine water should be avoided to minimize the remobilization of trapped contaminants such as Fe, Al, Mn and As. However, the pozzolanic material resulting from the CFA-AMD interaction could prevent such influx.

  15. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  16. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  17. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  18. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  19. Electrical Stimulation of Coleopteran Muscle for Initiating Flight.

    Science.gov (United States)

    Choo, Hao Yu; Li, Yao; Cao, Feng; Sato, Hirotaka

    2016-01-01

    Some researchers have long been interested in reconstructing natural insects into steerable robots or vehicles. However, until recently, these so-called cyborg insects, biobots, or living machines existed only in science fiction. Owing to recent advances in nano/micro manufacturing, data processing, and anatomical and physiological biology, we can now stimulate living insects to induce user-desired motor actions and behaviors. To improve the practicality and applicability of airborne cyborg insects, a reliable and controllable flight initiation protocol is required. This study demonstrates an electrical stimulation protocol that initiates flight in a beetle (Mecynorrhina torquata, Coleoptera). A reliable stimulation protocol was determined by analyzing a pair of dorsal longitudinal muscles (DLMs), flight muscles that oscillate the wings. DLM stimulation has achieved with a high success rate (> 90%), rapid response time (cyborg insects or biobots.

  20. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1997-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Armenia and the IAEA for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). It was approved by the Board of Governors on 23 September 1997, signed in Vienna on 29 September 1997, and it will enter into force on the date the Agency receives written notification that Armenia's statutory and/or constitutional requirements for entry into force have been met. Pending entry into force, this Protocol shall apply provisionally from the date of signature, i.e., 29 September 1997