WorldWideScience

Sample records for based enrichment protocols

  1. Power Tools for Talking: Custom Protocols Enrich Coaching Conversations

    Science.gov (United States)

    Pomerantz, Francesca; Ippolito, Jacy

    2015-01-01

    Discussion-based protocols--an "agreed upon set of discussion or observation rules that guide coach/teacher/student work, discussion, and interactions" (Ippolito & Lieberman, 2012, p. 79)--can help focus and structure productive professional learning discussions. However, while protocols are slowly growing into essential elements of…

  2. PC based uranium enrichment analyser

    International Nuclear Information System (INIS)

    Madan, V.K.; Gopalakrishana, K.R.; Bairi, B.R.

    1991-01-01

    It is important to measure enrichment of unirradiated nuclear fuel elements during production as a quality control measure. An IBM PC based system has recently been tested for enrichment measurements for Nuclear Fuel Complex (NFC), Hyderabad. As required by NFC, the system has ease of calibration. It is easy to switch the system from measuring enrichment of fuel elements to pellets and also automatically store the data and the results. The system uses an IBM PC plug in card to acquire data. The card incorporates programmable interval timers (8253-5). The counter/timer devices are executed by I/O mapped I/O's. A novel algorithm has been incorporated to make the system more reliable. The application software has been written in BASIC. (author). 9 refs., 1 fig

  3. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  4. Recommendations based on semantically enriched museum collections

    NARCIS (Netherlands)

    Wang, Y.; Stash, N.; Aroyo, L.M.; Gorgels, P.; Rutledge, L.W.; Schreiber, G.

    2008-01-01

    This article presents the CHIP demonstrator1 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, and Mobile Tour Guide. Based on the semantically enriched Rijksmuseum Amsterdam2 collection, we show how Semantic Web

  5. Iran to sign additional protocol and suspend uranium enrichment and reprocessing

    International Nuclear Information System (INIS)

    2003-01-01

    Full text: Iran's representative to the IAEA, Ambassador Ali Akbar Salehi, today delivered a letter to IAEA Director General, Mohamed ElBaradei conveying his Government's acceptance of the Additional Protocol. Mr. Salehi also informed the Director General that Iran had decided, as of today, to suspend all uranium enrichment-related and reprocessing activities in Iran - specifically, to suspend all activities on the site of Natanz, not to produce feed material for enrichment processes and not to import enrichment-related items. 'This is a welcome and positive development,' IAEA Director General Mohamed ElBaradei said. The IAEA intends to verify, in the context of the Safeguards Agreement and the Additional Protocol, the implementation by Iran of these decisions. At its meeting on 12 September, the IAEA Board of Governors adopted a resolution calling on Iran to sign, ratify and fully implement the Additional Protocol promptly and unconditionally, and as a confidence building measure to act henceforth in accordance with the Additional Protocol. The Board also called on Iran to suspend all further uranium enrichment and reprocessing activities, pending provision by the Director General of the assurances required by Member States and pending satisfactory application of the provisions of the Additional Protocol. Also today, Mr. ElBaradei has released his report to IAEA Member States on the 'Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran' for consideration at the 20 November Board of Governors' meeting. Unless the IAEA Board decides otherwise, the document's circulation is restricted and it cannot be released to the press. (IAEA)

  6. Solution-based targeted genomic enrichment for precious DNA samples

    Directory of Open Access Journals (Sweden)

    Shearer Aiden

    2012-05-01

    Full Text Available Abstract Background Solution-based targeted genomic enrichment (TGE protocols permit selective sequencing of genomic regions of interest on a massively parallel scale. These protocols could be improved by: 1 modifying or eliminating time consuming steps; 2 increasing yield to reduce input DNA and excessive PCR cycling; and 3 enhancing reproducible. Results We developed a solution-based TGE method for downstream Illumina sequencing in a non-automated workflow, adding standard Illumina barcode indexes during the post-hybridization amplification to allow for sample pooling prior to sequencing. The method utilizes Agilent SureSelect baits, primers and hybridization reagents for the capture, off-the-shelf reagents for the library preparation steps, and adaptor oligonucleotides for Illumina paired-end sequencing purchased directly from an oligonucleotide manufacturing company. Conclusions This solution-based TGE method for Illumina sequencing is optimized for small- or medium-sized laboratories and addresses the weaknesses of standard protocols by reducing the amount of input DNA required, increasing capture yield, optimizing efficiency, and improving reproducibility.

  7. 77 FR 14838 - General Electric-Hitachi Global Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-13

    ... Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment Facility, Wilmington, North Carolina... a license to General Electric-Hitachi Global Laser Enrichment LLC (GLE or the applicant) to authorize construction of a laser-based uranium enrichment facility and possession and use of byproduct...

  8. GOMA: functional enrichment analysis tool based on GO modules

    Institute of Scientific and Technical Information of China (English)

    Qiang Huang; Ling-Yun Wu; Yong Wang; Xiang-Sun Zhang

    2013-01-01

    Analyzing the function of gene sets is a critical step in interpreting the results of high-throughput experiments in systems biology.A variety of enrichment analysis tools have been developed in recent years,but most output a long list of significantly enriched terms that are often redundant,making it difficult to extract the most meaningful functions.In this paper,we present GOMA,a novel enrichment analysis method based on the new concept of enriched functional Gene Ontology (GO) modules.With this method,we systematically revealed functional GO modules,i.e.,groups of functionally similar GO terms,via an optimization model and then ranked them by enrichment scores.Our new method simplifies enrichment analysis results by reducing redundancy,thereby preventing inconsistent enrichment results among functionally similar terms and providing more biologically meaningful results.

  9. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  10. 77 FR 13367 - General Electric-Hitachi Global Laser Enrichment, LLC, Proposed Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-06

    ... NUCLEAR REGULATORY COMMISSION [NRC-2009-0157] General Electric-Hitachi Global Laser Enrichment, LLC, Proposed Laser-Based Uranium Enrichment Facility, Wilmington, NC AGENCY: Nuclear Regulatory... Impact Statement (EIS) for the proposed General Electric- Hitachi Global Laser Enrichment, LLC (GLE...

  11. Recovery of the Decorin-Enriched Fraction, Extract (D, From Human Skin: An Accelerated Protocol

    Directory of Open Access Journals (Sweden)

    Denys N. Wheatley

    2004-01-01

    Full Text Available The original extraction procedure of Engel and Catchpole [1] has often been used to recover decorin-enriched material from the skin. This material has a strong inhibitory effect on fibroblast proliferation, and clearly suppresses it in skin except after the first 5–6 days of wounding when new scaffold material is required. The aim of our present study has been to find and evaluate the product of a faster recovery method, and to check its consistency as a more reliable means of regularly obtaining sufficient material for topical application in wounds that might become hypertrophic. Modifications of the original Toole and Lowther [2] extraction procedure have been carefully evaluated in an attempt to cut preparation time without compromising biological activity of the inhibitory extract. We have devised a faster recovery procedure without compromising biological activity, even if initial recovery has been somewhat reduced. The latter problem could be offset by repeated cycles of the final extraction step. The main inhibitory activity is shown to be within the decorin-enriched “extract D,” as the core protein and DSPG II. Adjustment of the extract towards neutrality after dialysis against water keeps most of the extracted protein in solution and yielded a decorin-enriched preparation that had a specific activity equivalent to that of the old method. It also yielded a fraction that was readily lyophilised to give a small amount of material that could be stored indefinitely without loss of activity and readily redissolved in aqueous solution. A reliable and relatively quick method is presented for the production, from human skin, of a decorin-enriched preparation that has strong fibroblast inhibitory action. The value of the procedure is that it is inexpensive and can produce the quantities that might be used topically in reducing hypertrophic scarring of wounds.

  12. GAME (Goals - Activity - Motor Enrichment): protocol of a single blind randomised controlled trial of motor training, parent education and environmental enrichment for infants at high risk of cerebral palsy.

    Science.gov (United States)

    Morgan, Catherine; Novak, Iona; Dale, Russell C; Guzzetta, Andrea; Badawi, Nadia

    2014-10-07

    Cerebral palsy is the most common physical disability of childhood and early detection is possible using evidence based assessments. Systematic reviews indicate early intervention trials rarely demonstrate efficacy for improving motor outcomes but environmental enrichment interventions appear promising. This study is built on a previous pilot study and has been designed to assess the effectiveness of a goal - oriented motor training and enrichment intervention programme, "GAME", on the motor outcomes of infants at very high risk of cerebral palsy (CP) compared with standard community based care. A two group, single blind randomised controlled trial (n = 30) will be conducted. Eligible infants are those diagnosed with CP or designated "at high risk of CP" on the basis of the General Movements Assessment and/or abnormal neuroimaging. A physiotherapist and occupational therapist will deliver home-based GAME intervention at least fortnightly until the infant's first birthday. The intervention aims to optimize motor function and engage parents in developmental activities aimed at enriching the home learning environment. Primary endpoint measures will be taken 16 weeks after intervention commences with the secondary endpoint at 12 months and 24 months corrected age. The primary outcome measure will be the Peabody Developmental Motor Scale second edition. Secondary outcomes measures include the Gross Motor Function Measure, Bayley Scales of Infant and Toddler Development, Affordances in the Home Environment for Motor Development - Infant Scale, and the Canadian Occupational Performance Measure. Parent well-being will be monitored using the Depression Anxiety and Stress Scale. This paper presents the background, design and intervention protocol of a randomised trial of a goal driven, motor learning approach with customised environmental interventions and parental education for young infants at high risk of cerebral palsy. This trial is registered on the Australian

  13. Validation of low-volume enrichment protocols for detection of Escherichia coli O157 in raw ground beef components, using commercial kits.

    Science.gov (United States)

    Ahmed, Imtiaz; Hughes, Denise; Jenson, Ian; Karalis, Tass

    2009-03-01

    Testing of beef destined for use in ground beef products for the presence of Escherichia coli O157:H7 has become an important cornerstone of control and verification activities within many meat supply chains. Validation of the ability of methods to detect low levels of E. coli O157:H7 is critical to confidence in test systems. Many rapid methods have been validated against standard cultural methods for 25-g samples. In this study, a number of previously validated enrichment broths and commercially available test kits were validated for the detection of low numbers of E. coli O157:H7 in 375-g samples of raw ground beef component matrices using 1 liter of enrichment broth (large-sample:low-volume enrichment protocol). Standard AOAC International methods for 25-g samples in 225 ml of enrichment broth, using the same media, incubation conditions, and test kits, were used as reference methods. No significant differences were detected in the ability of any of the tests to detect low levels of E. coli O157:H7 in samples of raw ground beef components when enriched according to standard or large-sample:low-volume enrichment protocols. The use of large-sample:low-volume enrichment protocols provides cost savings for media and logistical benefits when handling and incubating large numbers of samples.

  14. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  15. Mercury release from deforested soils triggered by base cation enrichment

    International Nuclear Information System (INIS)

    Farella, N.; Lucotte, M.; Davidson, R.; Daigle, S.

    2006-01-01

    The Brazilian Amazon has experienced considerable colonization in the last few decades. Family agriculture based on slash-and-burn enables millions of people to live in that region. However, the poor nutrient content of most Amazonian soils requires cation-rich ashes from the burning of the vegetation biomass for cultivation to be successful, which leads to forest ecosystem degradation, soil erosion and mercury contamination. While recent studies have suggested that mercury present in soils was transferred towards rivers upon deforestation, little is known about the dynamics between agricultural land-use and mercury leaching. In this context, the present study proposes an explanation that illustrates how agricultural land-use triggers mercury loss from soils. This explanation lies in the competition between base cations and mercury in soils which are characterized by a low adsorption capacity. Since these soils are naturally very poor in base cations, the burning of the forest biomass suddenly brings high quantities of base cations to soils, destabilizing the previous equilibrium amongst cations. Base cation enrichment triggers mobility in soil cations, rapidly dislocating mercury atoms. This conclusion comes from principal component analyses illustrating that agricultural land-use was associated with base cation enrichment and mercury depletion. The overall conclusions highlight a pernicious cycle: while soil nutrient enrichment actually occurs through biomass burning, although on a temporary basis, there is a loss in Hg content, which is leached to rivers, entering the aquatic chain, and posing a potential health threat to local populations. Data presented here reflects three decades of deforestation activities, but little is known about the long-term impact of such a disequilibrium. These findings may have repercussions on our understanding of the complex dynamics of deforestation and agriculture worldwide

  16. Profiling plasma extracellular vesicle by pluronic block-copolymer based enrichment method unveils features associated with breast cancer aggression, metastasis and invasion.

    Science.gov (United States)

    Zhong, Zhenyu; Rosenow, Matthew; Xiao, Nick; Spetzler, David

    2018-01-01

    Extracellular vesicle (EV)-based liquid biopsies have been proposed to be a readily obtainable biological substrate recently for both profiling and diagnostics purposes. Development of a fast and reliable preparation protocol to enrich such small particles could accelerate the discovery of informative, disease-related biomarkers. Though multiple EV enrichment protocols are available, in terms of efficiency, reproducibility and simplicity, precipitation-based methods are most amenable to studies with large numbers of subjects. However, the selectivity of the precipitation becomes critical. Here, we present a simple plasma EV enrichment protocol based on pluronic block copolymer. The enriched plasma EV was able to be verified by multiple platforms. Our results showed that the particles enriched from plasma by the copolymer were EV size vesicles with membrane structure; proteomic profiling showed that EV-related proteins were significantly enriched, while high-abundant plasma proteins were significantly reduced in comparison to other precipitation-based enrichment methods. Next-generation sequencing confirmed the existence of various RNA species that have been observed in EVs from previous studies. Small RNA sequencing showed enriched species compared to the corresponding plasma. Moreover, plasma EVs enriched from 20 advanced breast cancer patients and 20 age-matched non-cancer controls were profiled by semi-quantitative mass spectrometry. Protein features were further screened by EV proteomic profiles generated from four breast cancer cell lines, and then selected in cross-validation models. A total of 60 protein features that highly contributed in model prediction were identified. Interestingly, a large portion of these features were associated with breast cancer aggression, metastasis as well as invasion, consistent with the advanced clinical stage of the patients. In summary, we have developed a plasma EV enrichment method with improved precipitation selectivity

  17. Sonication-based isolation and enrichment of Chlorella protothecoides chloroplasts for illumina genome sequencing

    Energy Technology Data Exchange (ETDEWEB)

    Angelova, Angelina [University of Arizona; Park, Sang-Hycuk [University of Arizona; Kyndt, John [Bellevue University; Fitzsimmons, Kevin [University of Arizona; Brown, Judith K [University of Arizona

    2013-09-01

    With the increasing world demand for biofuel, a number of oleaginous algal species are being considered as renewable sources of oil. Chlorella protothecoides Krüger synthesizes triacylglycerols (TAGs) as storage compounds that can be converted into renewable fuel utilizing an anabolic pathway that is poorly understood. The paucity of algal chloroplast genome sequences has been an important constraint to chloroplast transformation and for studying gene expression in TAGs pathways. In this study, the intact chloroplasts were released from algal cells using sonication followed by sucrose gradient centrifugation, resulting in a 2.36-fold enrichment of chloroplasts from C. protothecoides, based on qPCR analysis. The C. protothecoides chloroplast genome (cpDNA) was determined using the Illumina HiSeq 2000 sequencing platform and found to be 84,576 Kb in size (8.57 Kb) in size, with a GC content of 30.8 %. This is the first report of an optimized protocol that uses a sonication step, followed by sucrose gradient centrifugation, to release and enrich intact chloroplasts from a microalga (C. prototheocoides) of sufficient quality to permit chloroplast genome sequencing with high coverage, while minimizing nuclear genome contamination. The approach is expected to guide chloroplast isolation from other oleaginous algal species for a variety of uses that benefit from enrichment of chloroplasts, ranging from biochemical analysis to genomics studies.

  18. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  19. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... groups. In all cases, security follows from a well de ned complexity assumption (the strong root assumption), without relying on random oracles. A smooth natural number has no big prime factors. The probability, that a random natural number not greater than x has all prime factors smaller than x1/u...

  20. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  1. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  2. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  3. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  4. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  5. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  6. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  7. A simplified and cost-effective enrichment protocol for the isolation of Campylobacter spp. from retail broiler meat without microaerobic incubation

    LENUS (Irish Health Repository)

    Zhou, Ping

    2011-08-03

    Abstract Background To simplify the methodology for the isolation of Campylobacter spp. from retail broiler meat, we evaluated 108 samples (breasts and thighs) using an unpaired sample design. The enrichment broths were incubated under aerobic conditions (subsamples A) and for comparison under microaerobic conditions (subsamples M) as recommended by current reference protocols. Sensors were used to measure the dissolved oxygen (DO) in the broth and the percentage of oxygen (O2) in the head space of the bags used for enrichment. Campylobacter isolates were identified with multiplex PCR assays and typed using pulsed-field gel electrophoresis (PFGE). Ribosomal intergenic spacer analyses (RISA) and denaturing gradient gel electrophoresis (DGGE) were used to study the bacterial communities of subsamples M and A after 48 h enrichment. Results The number of Campylobacter positive subsamples were similar for A and M when all samples were combined (P = 0.81) and when samples were analyzed by product (breast: P = 0.75; thigh: P = 1.00). Oxygen sensors showed that DO values in the broth were around 6 ppm and O2 values in the head space were 14-16% throughout incubation. PFGE demonstrated high genomic similarity of isolates in the majority of the samples in which isolates were obtained from subsamples A and M. RISA and DGGE results showed a large variability in the bacterial populations that could be attributed to sample-to-sample variations and not enrichment conditions (aerobic or microaerobic). These data also suggested that current sampling protocols are not optimized to determine the true number of Campylobacter positive samples in retail boiler meat. Conclusions Decreased DO in enrichment broths is naturally achieved. This simplified, cost-effective enrichment protocol with aerobic incubation could be incorporated into reference methods for the isolation of Campylobacter spp. from retail broiler meat.

  8. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  9. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  12. Developing a yeast-based assay protocol to monitor total ...

    African Journals Online (AJOL)

    A yeast-based assay protocol developed for detecting oestrogenic activity in activated sludge (AS) supernatant is described. The protocol used Saccharomyces cerevisiae construct RMY/ER-ERE with human oestrogen receptor (ERα) and lacZ reporter genes, and was developed by modifying existing assays for use with AS ...

  13. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    International Nuclear Information System (INIS)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution

  14. Botulinum toxin type a injections for cervical and shoulder girdle myofascial pain using an enriched protocol design.

    Science.gov (United States)

    Nicol, Andrea L; Wu, Irene I; Ferrante, F Michael

    2014-06-01

    Myofascial pain syndrome is a regional condition of muscle pain and stiffness and is classically characterized by the presence of trigger points in affected musculature. Botulinum toxin type A (BoNT-A) has been shown to have antinociceptive properties and elicit sustained muscle relaxation, thereby possibly affording even greater relief than traditional strategies. Our goal was to determine whether direct injection of BoNT-A into painful muscle groups is effective for cervical and shoulder girdle myofascial pain. An enriched protocol design was used, wherein 114 patients with cervical and shoulder girdle myofascial pain underwent injection of BoNT-A to determine their response to the drug. Fifty-four responders were then enrolled in a 12-week, randomized, double-blind, placebo-controlled trial. Pain scales and quality of life measures were assessed at baseline and at routine follow-up visits until completion of the study after 26 weeks. Injection of BoNT-A into painful muscle groups improved average visual numerical pain scores in subjects who received a second dose of BoNT-A compared to placebo (P = 0.019 [0.26, 2.78]). Subjects who received a second dose of BoNT-A had a reduced number of headaches per week (P = 0.04 [0.07, 4.55]). Brief Pain Inventory interference scores for general activity and sleep were improved (P = 0.046 [0.038, 3.700] and 0.02 [0.37, 4.33], respectively) in those who received a second dose of BoNT-A. BoNT-A injected directly into painful muscle groups improves average pain scores and certain aspects of quality of life in patients experiencing severe cervical and shoulder girdle myofascial pain.

  15. Whole-system nutrient enrichment increases secondary production in a detritus-based ecosystem

    Science.gov (United States)

    W.F. Cross; J.B. Wallace; A.D. Rosemond; S.L. Eggert

    2006-01-01

    Although the effects of nutrient enrichment on consumer-resource dynamics are relatively well studied in ecosystems based on living plants, little is known about the manner in which enrichment influences the dynamics and productivity of consumers and resources in detritus-based ecosystems. Because nutrients can stimulate loss of carbon at the base of detrital food webs...

  16. Unattended Monitoring of HEU Production in Gaseous Centrifuge Enrichment Plants using Automated Aerosol Collection and Laser-based Enrichment Assay

    International Nuclear Information System (INIS)

    Anheier, Norman C.; Bushaw, Bruce A.

    2010-01-01

    Nuclear power is enjoying rapid growth as government energy policies and public demand shift toward low carbon energy production. Pivotal to the global nuclear power renaissance is the development and deployment of robust safeguards instrumentation that allows the limited resources of the IAEA to keep pace with the expansion of the nuclear fuel cycle. Undeclared production of highly enriched uranium (HEU) remains a primary proliferation concern for modern gaseous centrifuge enrichment plants (GCEPs), due to their massive separative work unit (SWU) processing power and comparably short cascade equilibrium timescale. The Pacific Northwest National Laboratory is developing an unattended safeguards instrument, combining continuous aerosol particulate collection with uranium isotope assay, to provide timely detection of HEU production within a GCEP. This approach is based on laser vaporization of aerosol particulates, followed by laser spectroscopy to characterize the uranium enrichment level. Our prior investigation demonstrated single-shot detection sensitivity approaching the femtogram range and relative isotope ratio uncertainty better than 10% using gadolinium as a surrogate for uranium. In this paper we present measurement results on standard samples containing traces of depleted, natural, and low enriched uranium, as well as measurements on aerodynamic size uranium particles mixed in background materials (e.g., dust, minerals, soils). Improvements and optimizations in the detection electronics, signal timing, calibration, and laser alignment have lead to significant improvements in detection sensitivity and enrichment accuracy, contributing to an overall reduction in the false alarm probability. The sample substrate media was also found to play a significant role in facilitating laser-induced vaporization and the production of energetic plasma conditions, resulting in ablation optimization and further improvements in the isotope abundance sensitivity.

  17. Enriched Title-Based Keyword Index Generation Using dBase II.

    Science.gov (United States)

    Rajendran, P. P.

    1986-01-01

    Describes the use of a database management system (DBMS)--dBaseII--to create an enriched title-based keyword index for a collection of news items at the Renewable Energy Resources Information Center of the Asian Institute of Technology. The use of DBMSs in libraries in developing countries is emphasized. (Author/LRW)

  18. Enriching step-based product information models to support product life-cycle activities

    Science.gov (United States)

    Sarigecili, Mehmet Ilteris

    The representation and management of product information in its life-cycle requires standardized data exchange protocols. Standard for Exchange of Product Model Data (STEP) is such a standard that has been used widely by the industries. Even though STEP-based product models are well defined and syntactically correct, populating product data according to these models is not easy because they are too big and disorganized. Data exchange specifications (DEXs) and templates provide re-organized information models required in data exchange of specific activities for various businesses. DEXs show us it would be possible to organize STEP-based product models in order to support different engineering activities at various stages of product life-cycle. In this study, STEP-based models are enriched and organized to support two engineering activities: materials information declaration and tolerance analysis. Due to new environmental regulations, the substance and materials information in products have to be screened closely by manufacturing industries. This requires a fast, unambiguous and complete product information exchange between the members of a supply chain. Tolerance analysis activity, on the other hand, is used to verify the functional requirements of an assembly considering the worst case (i.e., maximum and minimum) conditions for the part/assembly dimensions. Another issue with STEP-based product models is that the semantics of product data are represented implicitly. Hence, it is difficult to interpret the semantics of data for different product life-cycle phases for various application domains. OntoSTEP, developed at NIST, provides semantically enriched product models in OWL. In this thesis, we would like to present how to interpret the GD & T specifications in STEP for tolerance analysis by utilizing OntoSTEP.

  19. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  20. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  1. Evaluation of Methyl-Binding Domain Based Enrichment Approaches Revisited.

    Directory of Open Access Journals (Sweden)

    Karolina A Aberg

    Full Text Available Methyl-binding domain (MBD enrichment followed by deep sequencing (MBD-seq, is a robust and cost efficient approach for methylome-wide association studies (MWAS. MBD-seq has been demonstrated to be capable of identifying differentially methylated regions, detecting previously reported robust associations and producing findings that replicate with other technologies such as targeted pyrosequencing of bisulfite converted DNA. There are several kits commercially available that can be used for MBD enrichment. Our previous work has involved MethylMiner (Life Technologies, Foster City, CA, USA that we chose after careful investigation of its properties. However, in a recent evaluation of five commercially available MBD-enrichment kits the performance of the MethylMiner was deemed poor. Given our positive experience with MethylMiner, we were surprised by this report. In an attempt to reproduce these findings we here have performed a direct comparison of MethylMiner with MethylCap (Diagenode Inc, Denville, NJ, USA, the best performing kit in that study. We find that both MethylMiner and MethylCap are two well performing MBD-enrichment kits. However, MethylMiner shows somewhat better enrichment efficiency and lower levels of background "noise". In addition, for the purpose of MWAS where we want to investigate the majority of CpGs, we find MethylMiner to be superior as it allows tailoring the enrichment to the regions where most CpGs are located. Using targeted bisulfite sequencing we confirmed that sites where methylation was detected by either MethylMiner or by MethylCap indeed were methylated.

  2. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  3. A VXI-GPIB protocol converter based on DSP

    International Nuclear Information System (INIS)

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  4. Nuclear material enrichment identification method based on cross-correlation and high order spectra

    International Nuclear Information System (INIS)

    Yang Fan; Wei Biao; Feng Peng; Mi Deling; Ren Yong

    2013-01-01

    In order to enhance the sensitivity of nuclear material identification system (NMIS) against the change of nuclear material enrichment, the principle of high order statistic feature is introduced and applied to traditional NMIS. We present a new enrichment identification method based on cross-correlation and high order spectrum algorithm. By applying the identification method to NMIS, the 3D graphs with nuclear material character are presented and can be used as new signatures to identify the enrichment of nuclear materials. The simulation result shows that the identification method could suppress the background noises, electronic system noises, and improve the sensitivity against enrichment change to exponential order with no system structure modification. (authors)

  5. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  6. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  7. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2018-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another chal- lenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin...

  8. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2016-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin i...

  9. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  10. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  11. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  12. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  13. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  14. Internet protocol-based emergency services

    CERN Document Server

    Schulzrinne, Henning

    2013-01-01

    Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls.  Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Featur

  15. Comparative study on gene set and pathway topology-based enrichment methods.

    Science.gov (United States)

    Bayerlová, Michaela; Jung, Klaus; Kramer, Frank; Klemm, Florian; Bleckmann, Annalen; Beißbarth, Tim

    2015-10-22

    Enrichment analysis is a popular approach to identify pathways or sets of genes which are significantly enriched in the context of differentially expressed genes. The traditional gene set enrichment approach considers a pathway as a simple gene list disregarding any knowledge of gene or protein interactions. In contrast, the new group of so called pathway topology-based methods integrates the topological structure of a pathway into the analysis. We comparatively investigated gene set and pathway topology-based enrichment approaches, considering three gene set and four topological methods. These methods were compared in two extensive simulation studies and on a benchmark of 36 real datasets, providing the same pathway input data for all methods. In the benchmark data analysis both types of methods showed a comparable ability to detect enriched pathways. The first simulation study was conducted with KEGG pathways, which showed considerable gene overlaps between each other. In this study with original KEGG pathways, none of the topology-based methods outperformed the gene set approach. Therefore, a second simulation study was performed on non-overlapping pathways created by unique gene IDs. Here, methods accounting for pathway topology reached higher accuracy than the gene set methods, however their sensitivity was lower. We conducted one of the first comprehensive comparative works on evaluating gene set against pathway topology-based enrichment methods. The topological methods showed better performance in the simulation scenarios with non-overlapping pathways, however, they were not conclusively better in the other scenarios. This suggests that simple gene set approach might be sufficient to detect an enriched pathway under realistic circumstances. Nevertheless, more extensive studies and further benchmark data are needed to systematically evaluate these methods and to assess what gain and cost pathway topology information introduces into enrichment analysis. Both

  16. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    Science.gov (United States)

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  17. Portable abdomen radiography. Moving to thickness-based protocols

    International Nuclear Information System (INIS)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A.

    2018-01-01

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  18. Portable abdomen radiography. Moving to thickness-based protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A. [University of Chicago Medical Center, Department of Radiology, Chicago, IL (United States)

    2018-02-15

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  19. Isotope enrichment

    International Nuclear Information System (INIS)

    Lydtin, H-J.; Wilden, R.J.; Severin, P.J.W.

    1978-01-01

    The isotope enrichment method described is based on the recognition that, owing to mass diffusion and thermal diffusion in the conversion of substances at a heated substrate while depositing an element or compound onto the substrate, enrichment of the element, or a compound of the element, with a lighter isotope will occur. The cycle is repeated for as many times as is necessary to obtain the degree of enrichment required

  20. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  1. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  2. An XML-Based Protocol for Distributed Event Services

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  3. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  4. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  5. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  6. Highly Selective Enrichment of Glycopeptides Based on Zwitterionically Functionalized Soluble Nanopolymers

    Science.gov (United States)

    Cao, Weiqian; Huang, Jiangming; Jiang, Biyun; Gao, Xing; Yang, Pengyuan

    2016-07-01

    Efficient glycopeptides enrichment prior to mass spectrometry analysis is essential for glycoproteome study. ZIC-HILIC (zwitterionic hydrophilic interaction liquid chromatography) based glycopeptides enrichment approaches have been attracting more attention for several benefits like easy operating, high enrichment specificity and intact glycopeptide retained. In this study, Poly (amidoamine) dendrimer (PAMAM) was adopted for the synthesis of zwitterionically functionalized (ZICF) materials for glycopeptide enrichment. The multiple branched structure and good solubility of ZICF-PAMAM enables a sufficient interaction with glycopeptides. The ZICF-PAMAM combined with the FASP-mode enrichment strategy exhibits more superior performance compared with the existing methods. It has the minimum detectable concentration of femtomolar level and high recovery rate of over 90.01%, and can efficiently enrich glycopeptides from complex biological samples even for merely 0.1 μL human serum. The remarkable glycopeptides enrichment capacity of ZICF-PAMAM highlights the potential application in in-depth glycoproteome research, which may open up new opportunities for the development of glycoproteomics.

  7. Real-time PCR detection of Listeria monocytogenes in infant formula and lettuce following macrophage-based isolation and enrichment.

    Science.gov (United States)

    Day, J B; Basavanna, U

    2015-01-01

    To develop a rapid detection procedure for Listeria monocytogenes in infant formula and lettuce using a macrophage-based enrichment protocol and real-time PCR. A macrophage cell culture system was employed for the isolation and enrichment of L. monocytogenes from infant formula and lettuce for subsequent identification using real-time PCR. Macrophage monolayers were exposed to infant formula and lettuce contaminated with a serial dilution series of L. monocytogenes. As few as approx. 10 CFU ml(-1) or g(-1) of L. monocytogenes were detected in infant formula and lettuce after 16 h postinfection by real-time PCR. Internal positive PCR controls were utilized to eliminate the possibility of false-negative results. Co-inoculation with Listeria innocua did not reduce the L. monocytogenes detection sensitivity. Intracellular L. monocytogenes could also be isolated on Listeria selective media from infected macrophage lysates for subsequent confirmation. The detection method is highly sensitive and specific for L. monocytogenes in infant formula and lettuce and establishes a rapid identification time of 20 and 48 h for presumptive and confirmatory identification, respectively. The method is a promising alternative to many currently used q-PCR detection methods which employ traditional selective media for enrichment of contaminated food samples. Macrophage enrichment of L. monocytogenes eliminates PCR inhibitory food elements and contaminating food microflora which produce cleaner samples that increase the rapidity and sensitivity of detection. Published 2014. This article is a U.S. Government work and is in the public domain in the USA.

  8. Pathway enrichment analysis approach based on topological structure and updated annotation of pathway.

    Science.gov (United States)

    Yang, Qian; Wang, Shuyuan; Dai, Enyu; Zhou, Shunheng; Liu, Dianming; Liu, Haizhou; Meng, Qianqian; Jiang, Bin; Jiang, Wei

    2017-08-16

    Pathway enrichment analysis has been widely used to identify cancer risk pathways, and contributes to elucidating the mechanism of tumorigenesis. However, most of the existing approaches use the outdated pathway information and neglect the complex gene interactions in pathway. Here, we first reviewed the existing widely used pathway enrichment analysis approaches briefly, and then, we proposed a novel topology-based pathway enrichment analysis (TPEA) method, which integrated topological properties and global upstream/downstream positions of genes in pathways. We compared TPEA with four widely used pathway enrichment analysis tools, including database for annotation, visualization and integrated discovery (DAVID), gene set enrichment analysis (GSEA), centrality-based pathway enrichment (CePa) and signaling pathway impact analysis (SPIA), through analyzing six gene expression profiles of three tumor types (colorectal cancer, thyroid cancer and endometrial cancer). As a result, we identified several well-known cancer risk pathways that could not be obtained by the existing tools, and the results of TPEA were more stable than that of the other tools in analyzing different data sets of the same cancer. Ultimately, we developed an R package to implement TPEA, which could online update KEGG pathway information and is available at the Comprehensive R Archive Network (CRAN): https://cran.r-project.org/web/packages/TPEA/. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Uranium enrichment. Enrichment processes

    International Nuclear Information System (INIS)

    Alexandre, M.; Quaegebeur, J.P.

    2009-01-01

    Despite the remarkable progresses made in the diversity and the efficiency of the different uranium enrichment processes, only two industrial processes remain today which satisfy all of enriched uranium needs: the gaseous diffusion and the centrifugation. This article describes both processes and some others still at the demonstration or at the laboratory stage of development: 1 - general considerations; 2 - gaseous diffusion: physical principles, implementation, utilisation in the world; 3 - centrifugation: principles, elementary separation factor, flows inside a centrifuge, modeling of separation efficiencies, mechanical design, types of industrial centrifuges, realisation of cascades, main characteristics of the centrifugation process; 4 - aerodynamic processes: vortex process, nozzle process; 5 - chemical exchange separation processes: Japanese ASAHI process, French CHEMEX process; 6 - laser-based processes: SILVA process, SILMO process; 7 - electromagnetic and ionic processes: mass spectrometer and calutron, ion cyclotron resonance, rotating plasmas; 8 - thermal diffusion; 9 - conclusion. (J.S.)

  10. Pedagogical Quality Enrichment in OER-Based Courseware: Guiding Principles

    Science.gov (United States)

    Misra, Pradeep Kumar

    2013-01-01

    This is a critical phase for Open Educational Resources (OER) movement: on one side the number of OER is increasing rapidly, and on other side debates about quality of OER-based courseware are heating up. These debates emanate from the fact that OER-based courseware are supposed to help users to follow a logical learning path and get an engaging,…

  11. Nutrient enrichment differentially affects body sizes of primary consumers and predators in a detritus-based stream

    Science.gov (United States)

    John M. Davis; Amy D. Rosemond; Sue L. Eggert; Wyatt F. Cross; J. Bruce. Wallace

    2010-01-01

    We assessed how a 5-yr nutrient enrichment affected the responses of different size classes of primary consumers and predators in a detritus-based headwater stream. We hypothesized that alterations in detritus availability because of enrichment would decrease the abundance and biomass of large-bodied consumers. In contrast, we found that 2 yr of enrichment increased...

  12. Mung bean nuclease treatment increases capture specificity of microdroplet-PCR based targeted DNA enrichment.

    Directory of Open Access Journals (Sweden)

    Zhenming Yu

    Full Text Available Targeted DNA enrichment coupled with next generation sequencing has been increasingly used for interrogation of select sub-genomic regions at high depth of coverage in a cost effective manner. Specificity measured by on-target efficiency is a key performance metric for target enrichment. Non-specific capture leads to off-target reads, resulting in waste of sequencing throughput on irrelevant regions. Microdroplet-PCR allows simultaneous amplification of up to thousands of regions in the genome and is among the most commonly used strategies for target enrichment. Here we show that carryover of single-stranded template genomic DNA from microdroplet-PCR constitutes a major contributing factor for off-target reads in the resultant libraries. Moreover, treatment of microdroplet-PCR enrichment products with a nuclease specific to single-stranded DNA alleviates off-target load and improves enrichment specificity. We propose that nuclease treatment of enrichment products should be incorporated in the workflow of targeted sequencing using microdroplet-PCR for target capture. These findings may have a broad impact on other PCR based applications for which removal of template DNA is beneficial.

  13. Enriching Triangle Mesh Animations with Physically Based Simulation.

    Science.gov (United States)

    Li, Yijing; Xu, Hongyi; Barbic, Jernej

    2017-10-01

    We present a system to combine arbitrary triangle mesh animations with physically based Finite Element Method (FEM) simulation, enabling control over the combination both in space and time. The input is a triangle mesh animation obtained using any method, such as keyframed animation, character rigging, 3D scanning, or geometric shape modeling. The input may be non-physical, crude or even incomplete. The user provides weights, specified using a minimal user interface, for how much physically based simulation should be allowed to modify the animation in any region of the model, and in time. Our system then computes a physically-based animation that is constrained to the input animation to the amount prescribed by these weights. This permits smoothly turning physics on and off over space and time, making it possible for the output to strictly follow the input, to evolve purely based on physically based simulation, and anything in between. Achieving such results requires a careful combination of several system components. We propose and analyze these components, including proper automatic creation of simulation meshes (even for non-manifold and self-colliding undeformed triangle meshes), converting triangle mesh animations into animations of the simulation mesh, and resolving collisions and self-collisions while following the input.

  14. Enriching location-based games with navigational game activities

    DEFF Research Database (Denmark)

    Nadarajah, Stephanie Githa; Overgaard, Benjamin Nicholas; Pedersen, Peder Walz

    2016-01-01

    Mobile location-based games are experiences that entertain its players by requiring interactions mainly at points of interest (POIs). Navigation between POIs often involve the use of either a physical or digital map, not taking advantage of the opportunity available to engage users in activities...

  15. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  16. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  17. Enriched Boron-Doped Amorphous Selenium Based Position-Sensitive Solid-State Thermal Neutron Detector for MPACT Applications

    Energy Technology Data Exchange (ETDEWEB)

    Mandal, Krishna [Univ. of South Carolina, Columbia, SC (United States)

    2017-09-29

    High-efficiency thermal neutron detectors with compact size, low power-rating and high spatial, temporal and energy resolution are essential to execute non-proliferation and safeguard protocols. The demands of such detector are not fully covered by the current detection system such as gas proportional counters or scintillator-photomultiplier tube combinations, which are limited by their detection efficiency, stability of response, speed of operation, and physical size. Furthermore, world-wide shortage of 3He gas, required for widely used gas detection method, has further prompted to design an alternative system. Therefore, a solid-state neutron detection system without the requirement of 3He will be very desirable. To address the above technology gap, we had proposed to develop new room temperature solidstate thermal neutron detectors based on enriched boron (10B) and enriched lithium (6Li) doped amorphous Se (As- 0.52%, Cl 5 ppm) semiconductor for MPACT applications. The proposed alloy materials have been identified for its many favorable characteristics - a wide bandgap (~2.2 eV at 300 K) for room temperature operation, high glass transition temperature (tg ~ 85°C), a high thermal neutron cross-section (for boron ~ 3840 barns, for lithium ~ 940 barns, 1 barn = 10-24 cm2), low effective atomic number of Se for small gamma ray sensitivity, and high radiation tolerance due to its amorphous structure.

  18. Enriched Boron-Doped Amorphous Selenium Based Position-Sensitive Solid-State Thermal Neutron Detector for MPACT Applications

    International Nuclear Information System (INIS)

    Mandal, Krishna

    2017-01-01

    High-efficiency thermal neutron detectors with compact size, low power-rating and high spatial, temporal and energy resolution are essential to execute non-proliferation and safeguard protocols. The demands of such detector are not fully covered by the current detection system such as gas proportional counters or scintillator-photomultiplier tube combinations, which are limited by their detection efficiency, stability of response, speed of operation, and physical size. Furthermore, world-wide shortage of 3 He gas, required for widely used gas detection method, has further prompted to design an alternative system. Therefore, a solid-state neutron detection system without the requirement of 3 He will be very desirable. To address the above technology gap, we had proposed to develop new room temperature solidstate thermal neutron detectors based on enriched boron ( 10 B) and enriched lithium ( 6 Li) doped amorphous Se (As- 0.52%, Cl 5 ppm) semiconductor for MPACT applications. The proposed alloy materials have been identified for its many favorable characteristics - a wide bandgap (~2.2 eV at 300 K) for room temperature operation, high glass transition temperature (t g ~ 85°C), a high thermal neutron cross-section (for boron ~ 3840 barns, for lithium ~ 940 barns, 1 barn = 10 -24 cm 2 ), low effective atomic number of Se for small gamma ray sensitivity, and high radiation tolerance due to its amorphous structure.

  19. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  20. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  1. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  2. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  3. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  4. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  5. Foraging-Based Enrichment Promotes More Varied Behaviour in Captive Australian Fur Seals (Arctocephalus pusillus doriferus)

    Science.gov (United States)

    Hocking, David P.; Salverson, Marcia; Evans, Alistair R.

    2015-01-01

    During wild foraging, Australian fur seals (Arctocephalus pusillus doriferus) encounter many different types of prey in a wide range of scenarios, yet in captive environments they are typically provided with a narrower range of opportunities to display their full repertoire of behaviours. This study aimed to quantitatively explore the effect of foraging-based enrichment on the behaviour and activity patterns displayed by two captive Australian fur seals at Melbourne Zoo, Australia. Food was presented as a scatter in open water, in a free-floating ball device, or in a static box device, with each treatment separated by control trials with no enrichment. Both subjects spent more time interacting with the ball and static box devices than the scatter feed. The total time spent pattern swimming was reduced in the enrichment treatments compared to the controls, while the time spent performing random swimming behaviours increased. There was also a significant increase in the total number of bouts of behaviour performed in all three enrichment treatments compared to controls. Each enrichment method also promoted a different suit of foraging behaviours. Hence, rather than choosing one method, the most effective way to increase the diversity of foraging behaviours, while also increasing variation in general activity patterns, is to provide seals with a wide range of foraging scenarios where food is encountered in different ways. PMID:25946412

  6. Oxidative stability of fish oil-enriched mayonnaise-based salads

    DEFF Research Database (Denmark)

    Sørensen, Ann-Dorit Moltke; Nielsen, Nina Skall; Jacobsen, Charlotte

    2010-01-01

    The oxidative stability of fish oil-enriched mayonnaise-based salads and the influence of different vegetables in shrimp and tuna salads were evaluated. Moreover, the lipid oxidation in the presence of 1% oregano, rosemary, or thyme in fish oil-enriched tuna salad was assessed. The results obtain......-oxidative effect of shrimp. The effect of ingredients in tuna salads was inconclusive, possibly due to a high content of volatiles in the vegetables themselves. However, the addition of spices increased the oxidative stability of tuna salad (oregano>rosemary>thyme)....

  7. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  8. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  9. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  10. Inquiry-Based Science and Technology Enrichment Program for Middle School-Aged Female Students

    Science.gov (United States)

    Kim, Hanna

    2016-01-01

    This study investigates the effects of an intensive 1-week Inquiry-Based Science and Technology Enrichment Program (InSTEP) designed for middle school-aged female students. InSTEP uses a guided/open inquiry approach that is deepened and redefined as eight sciences and engineering practices in the Next Generation Science Standards, which aimed at…

  11. Specific Affinity Enrichment of Electrochemically Cleaved Peptides Based on Cu(II)-Mediated Spirolactone Tagging

    NARCIS (Netherlands)

    Zhang, Tao; de Vries, Marcel P.; Permentier, Hjalmar P.; Bischoff, Rainer

    2017-01-01

    Specific digestion of proteins is an essential step for mass spectrometry-based proteomics, and the chemical labeling of the resulting peptides is often used for peptide enrichment or the introduction of desirable tags. Electrochemical oxidation yielding specific cleavage C-terminal to tyrosine

  12. Enriching semantic knowledge bases for opinion mining in big data applications.

    Science.gov (United States)

    Weichselbraun, A; Gindl, S; Scharl, A

    2014-10-01

    This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only applicable to traditional sentiment lexicons, but also to more comprehensive, multi-dimensional affective resources such as SenticNet. It comprises the following steps: (i) identify ambiguous sentiment terms, (ii) provide context information extracted from a domain-specific training corpus, and (iii) ground this contextual information to structured background knowledge sources such as ConceptNet and WordNet. A quantitative evaluation shows a significant improvement when using an enriched version of SenticNet for polarity classification. Crowdsourced gold standard data in conjunction with a qualitative evaluation sheds light on the strengths and weaknesses of the concept grounding, and on the quality of the enrichment process.

  13. Optimization of PWR fuel assembly radial enrichment and burnable poison location based on adaptive simulated annealing

    International Nuclear Information System (INIS)

    Rogers, Timothy; Ragusa, Jean; Schultz, Stephen; St Clair, Robert

    2009-01-01

    The focus of this paper is to present a concurrent optimization scheme for the radial pin enrichment and burnable poison location in PWR fuel assemblies. The methodology is based on the Adaptive Simulated Annealing (ASA) technique, coupled with a neutron lattice physics code to update the cost function values. In this work, the variations in the pin U-235 enrichment are variables to be optimized radially, i.e., pin by pin. We consider the optimization of two categories of fuel assemblies, with and without Gadolinium burnable poison pins. When burnable poisons are present, both the radial distribution of enrichment and the poison locations are variables in the optimization process. Results for 15 x 15 PWR fuel assembly designs are provided.

  14. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  15. A secure medical data exchange protocol based on cloud environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn

    2014-09-01

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

  16. Studies of hemidesmosomes in human amnion: the use of a detergent extraction protocol for compositional and ultrastructural analysis and preparation of a hemidesmosome-enriched fraction from tissue.

    Science.gov (United States)

    Behzad, F; Jones, C J; Ball, S; Alvares, T; Aplin, J D

    1995-01-01

    A method is described for the sequential detergent and high ionic strength extraction of human amnion with the progressive enrichment of the intermediate filament (IF) cytoskeleton and its associated structures including hemidesmosomes (HD). TEM of the extracted epithelium in situ reveals IF bundles beneath the apical cell surface, around the nucleus and at the lateral edges of the cells where association with desmosomes occurs. IF bundles are also very prominent within basal cell processes where they loop through the cytoplasm adjacent to the HDs. A novel connecting filament network is observed running between the IFs and the hemidesmosomal dense plaque. The adjacent IF network contains both cytokeratin and vimentin, the latter revealed much more fully as a result of the extraction protocol. The hemidesmosomal plasma membrane contains integrin subunits alpha 6 and beta 4 and these are quantitatively retained as the basal cell surface during extraction, while nonjunctional plasma membrane is solubilised. Integrin beta 1 is found at the basolateral cell surface but, like actin, is extracted quantitatively and is not present in HDs. The extracted epithelial cells may be recovered by scraping and the IF network depolymerised to produce a particulate fraction containing short residual IFs, associated thin filaments and plaque material. This fraction contains immunoreactive cytokeratin and vimentin. Integrin alpha 6 beta 4 has been used as a biochemical criterion of the presence of HD material in the fraction. Both subunits are highly enriched. The fraction also contains the hemidesmosomal components HD1, BP230 and BP180. This method is likely to be useful in further characterisation of the HD.

  17. Self-testing protocols based on the chained Bell inequalities

    International Nuclear Information System (INIS)

    Šupić, I; Augusiak, R; Salavrakos, A; Acín, A

    2016-01-01

    Self-testing is a device-independent technique based on non-local correlations whose aim is to certify the effective uniqueness of the quantum state and measurements needed to produce these correlations. It is known that the maximal violation of some Bell inequalities suffices for this purpose. However, most of the existing self-testing protocols for two devices exploit the well-known Clauser–Horne–Shimony–Holt Bell inequality or modifications of it, and always with two measurements per party. Here, we generalize the previous results by demonstrating that one can construct self-testing protocols based on the chained Bell inequalities, defined for two devices implementing an arbitrary number of two-output measurements. On the one hand, this proves that the quantum state and measurements leading to the maximal violation of the chained Bell inequality are unique. On the other hand, in the limit of a large number of measurements, our approach allows one to self-test the entire plane of measurements spanned by the Pauli matrices X and Z. Our results also imply that the chained Bell inequalities can be used to certify two bits of perfect randomness. (paper)

  18. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  19. Kyoto Protocol, constraint or opportunity for coal based electricity producers

    International Nuclear Information System (INIS)

    Balasoiu, Constantin; Alecu, Sorin

    2006-01-01

    Coming into force of Kyoto Protocol (KP) in February 2005, as a result of its signing by Russian Federation, created the lawfulness of its provisions and mechanisms in order to reduce the average emission of Greenhouse Gases (GHG) at a global level down to 5.2 %. Passing this environment problem from a constrained area (regulations, directives) to an opportunity area (business) created the possibility that the achievement of KP objectives to be not an exclusive financial task of 'polluting actors', but opened the opportunity of bringing on stage all the necessary elements of a modern business environment: banks, investments from founds companies, consultants, buyers, sellers, stocks exchange. Until now, the investments and emissions transactions based by KP mechanisms at the worldwide level was focused on renewable energy area. Because for the most of countries, including Romania, the production of electricity based on fossil fuels (special coal) is one of the main option, bringing the KP mechanisms in operation in this area is difficult for at least two reasons: - the investments are huge; - the emissions reduction is not spectacular. In these circumstances, this paper gives an overview of the present GHG emission market, transaction mechanisms on this market and of the ways through which coal based electricity producers from Romania can access this market. We consider that the filtration of the information in this area from electricity producer point of view makes the content of this paper a good start for a new approach of environment management and its conversion from constraint (financial resources consumer) to opportunity ( financial resources producer). The paper contains are as follows: 1. Kyoto Protocol at a glance; 2. Emission trading mechanisms; 2.1. Transaction mechanisms under KP; 2.1.1. Joint Implementation (JI); 2.1.2 Clean Development Mechanism (CDM); 2.1.3. Emissions Trading (ET); 2.2. Other transactions mechanisms; 2.2.1. European Union Emissions

  20. A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

    Directory of Open Access Journals (Sweden)

    Anand Prakash

    2014-03-01

    Full Text Available Wireless Sensor Networks (WSNs with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly.  

  1. An approach to enrich online medical Problem-Based Learning with tacit healthcare knowledge.

    Science.gov (United States)

    Cheah, Yu-N; Rashid, Faridah Abdul; Abidi, Syed Sibte Raza

    2003-01-01

    Existing Problem-Based Learning (PBL) problems, though suitable in their own right for teaching purposes, are limited in their potential to evolve by themselves and to create new knowledge. Presently, they are based on textbook examples of past cases and/or cases that have been transcribed by a clinician. In this paper, we present (a) a tacit healthcare knowledge representation formalism called Healthcare Scenarios, (b) the relevance of healthcare scenarios in PBL in healthcare and medicine, (c) a novel PBL-Scenario-based tacit knowledge explication strategy and (d) an online PBL Problem Composer and Presenter (PBL-Online) to facilitate the acquisition and utilisation of expert-quality tacit healthcare knowledge to enrich online PBL. We employ a confluence of healthcare knowledge management tools and Internet technologies to bring tacit healthcare knowledge-enriched PBL to a global and yet more accessible level.

  2. Rheology, fatty acid profile and quality characteristics of nutrient enriched pizza base.

    Science.gov (United States)

    Gupta, Chaitali Sen; Milind; Jeyarani, T; Rajiv, Jyotsna

    2015-05-01

    Enrichment of thick bread type pizza base (PZB) was done by substituting wheat flour (WF) with 5, 10 and 15 % soya protein isolate (SPI). The rheological characteristics of WF showed that water absorption increased, extensibility and peak viscosity decreased when level of SPI increased from 5 to 15 %. Baking studies showed that spread ratio decreased and hardness values of PZB increased with the increase in amount of SPI from 5 to15 %. Beyond 10 % SPI, the overall quality of PZB was adversely affected. To the optimal blend of 10 % SPI, 5 % psyllium husk (PH) was added and the hydrogenated fat was replaced by canola oil (CAN) in enriched PZB. The enriched PZB treated with combination of additives had 1.7 and 1.6 times more protein and dietary fiber than the control PZB. Fatty acid analysis showed that the enriched PZB had 58.65 % oleic, 6.58 % linolenic acid and 31.28 % polyunsaturated fatty acid and no Trans fat was present.

  3. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  4. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  5. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  6. Enriching semantic knowledge bases for opinion mining in big data applications

    OpenAIRE

    Weichselbraun, A.; Gindl, S.; Scharl, A.

    2014-01-01

    This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only applicable to traditional sentiment lexicons, but also to more comprehensive, multi-dimensional affective resources such as SenticNet. It comprises the following steps: (i) identify ambiguous sentiment terms, (ii) provide context information extracted from a doma...

  7. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  8. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  9. A Data-origin Authentication Protocol Based on ONOS Cluster

    Directory of Open Access Journals (Sweden)

    Qin Hua

    2016-01-01

    Full Text Available This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a SDN controller which can work under a distributed environment. However, the security of an ONOS cluster is seldom considered, and the communication in an ONOS cluster may suffer from lots of security threats. In this paper, we used a two-tier self-renewable hash chain for identity authentication and data-origin authentication. We analyse the security and overhead of our proposal and made a comparison with current security measure. It showed that with the help of our proposal, communication in an ONOS cluster could be protected from identity forging, replay attacks, data tampering, MITM attacks and repudiation, also the computational overhead would decrease apparently.

  10. Assessment of lectin and HILIC based enrichment protocols for characterization of serum glycoproteins by mass spectrometry

    DEFF Research Database (Denmark)

    Calvano, Cosima D; Zambonin, Carlo G; Jensen, Ole Nørregaard

    2008-01-01

    glycosylation profiles are associated with certain human ailments. Glycoprotein analysis by mass spectrometry of biological samples, such as blood serum, is hampered by sample complexity and the low concentration of the potentially informative glycopeptides and -proteins. We assessed the utility of lectin...... of 63 glycosylation sites in 38 proteins were identified by both methods, demonstrating distinct differences and complementarity. Serial application of custom-made microcolumns of mixed, immobilized lectins proved efficient for recovery and analysis of glycopeptides from serum samples of breast cancer...

  11. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  12. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  13. FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Zhan Wei Siew

    2012-12-01

    Full Text Available Wireless sensor networks (WSNs have been vastly developed due to the advances in microelectromechanical systems (MEMS using WSN to study and monitor the environments towards climates changes. In environmental monitoring, sensors are randomly deployed over the interest area to periodically sense the physical environments for a few months or even a year. Therefore, to prolong the network lifetime with limited battery capacity becomes a challenging issue. Low energy adaptive cluster hierarchical (LEACH is the common clustering protocol that aim to reduce the energy consumption by rotating the heavy workload cluster heads (CHs. The CHs election in LEACH is based on probability model which will lead to inefficient in energy consumption due to least desired CHs location in the network. In WSNs, the CHs location can directly influence the network energy consumption and further affect the network lifetime. In this paper, factors which will affect the network lifetime will be presented and the demonstration of fuzzy logic based CH selection conducted in base station (BS will also be carried out. To select suitable CHs that will prolong the network first node dies (FND round and consistent throughput to the BS, energy level and distance to the BS are selected as fuzzy inputs.

  14. Erythrocyte enrichment in hematopoietic progenitor cell cultures based on magnetic susceptibility of the hemoglobin.

    Directory of Open Access Journals (Sweden)

    Xiaoxia Jin

    Full Text Available Using novel media formulations, it has been demonstrated that human placenta and umbilical cord blood-derived CD34+ cells can be expanded and differentiated into erythroid cells with high efficiency. However, obtaining mature and functional erythrocytes from the immature cell cultures with high purity and in an efficient manner remains a significant challenge. A distinguishing feature of a reticulocyte and maturing erythrocyte is the increasing concentration of hemoglobin and decreasing cell volume that results in increased cell magnetophoretic mobility (MM when exposed to high magnetic fields and gradients, under anoxic conditions. Taking advantage of these initial observations, we studied a noninvasive (label-free magnetic separation and analysis process to enrich and identify cultured functional erythrocytes. In addition to the magnetic cell separation and cell motion analysis in the magnetic field, the cell cultures were characterized for cell sedimentation rate, cell volume distributions using differential interference microscopy, immunophenotyping (glycophorin A, hemoglobin concentration and shear-induced deformability (elongation index, EI, by ektacytometry to test for mature erythrocyte attributes. A commercial, packed column high-gradient magnetic separator (HGMS was used for magnetic separation. The magnetically enriched fraction comprised 80% of the maturing cells (predominantly reticulocytes that showed near 70% overlap of EI with the reference cord blood-derived RBC and over 50% overlap with the adult donor RBCs. The results demonstrate feasibility of label-free magnetic enrichment of erythrocyte fraction of CD34+ progenitor-derived cultures based on the presence of paramagnetic hemoglobin in the maturing erythrocytes.

  15. Huntahan* vocab assessment toward enriching mother tongue-based classroom practices

    Directory of Open Access Journals (Sweden)

    Cacho Reynald M.

    2015-01-01

    Full Text Available This two-phase action research examined the profile and knowledge level of Grade III pupils about their knowledge on the distinct local vocabularies in order to formulate enrichment or intervention, to address any deficiency or lack of, and to assess whether such enrichment programs are effective for authentic, localized implementation of the MTB-MLE. The research instruments used in the first phase included survey and vocabulary assessment test. The researchers initially employed descriptive statistics to interpret the result. Majority of the respondents have established residency in Lopez, Quezon for at least four years. All of the pupils speak Tagalog only at home. The first phase of the research revealed that the pupils of Lopez West Elementary School Bldg. 1 performed satisfactorily in the language test. Most of them found that the most difficult words are generally content words. The initial results of this study serve as baseline information implying that the pupils’ level of understanding of the Lopezeños words needs enhancement and/or reinforcements; hence, there is an urgent need to implement the 2nd cycle of this action research. The second phase once implemented seeks to evaluate the effectiveness of the intervention and/or enrichment activities that may guide language teachers in the conduct of classroom-based, culturally sensitive, contextualized language instruction.

  16. An Agent-Based Auction Protocol on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yu-Fang Chung

    2014-01-01

    Full Text Available This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.

  17. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  18. Data distribution architecture based on standard real time protocol

    International Nuclear Information System (INIS)

    Castro, R.; Vega, J.; Pereira, A.; Portas, A.

    2009-01-01

    Data distribution architecture (DDAR) has been designed conforming to new requirements, taking into account the type of data that is going to be generated from experiments in International Thermonuclear Experimental Reactor (ITER). The main goal of this architecture is to implement a system that is able to manage on line all data that is being generated by an experiment, supporting its distribution for: processing, storing, analysing or visualizing. The first objective is to have a distribution architecture that supports long pulse experiments (even hours). The described system is able to distribute, using real time protocol (RTP), stored data or live data generated while the experiment is running. It enables researchers to access data on line instead of waiting for the end of the experiment. Other important objective is scalability, so the presented architecture can easily grow based on actual necessities, simplifying estimation and design tasks. A third important objective is security. In this sense, the architecture is based on standards, so complete security mechanisms can be applied, from secure transmission solutions until elaborated access control policies, and it is full compatible with multi-organization federation systems as PAPI or Shibboleth.

  19. Management of the infertile couple: an evidence-based protocol

    Directory of Open Access Journals (Sweden)

    Kamel Remah M

    2010-03-01

    Full Text Available Abstract Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG, American Society for Reproductive Medicine (ASRM, Canadian Fertility and Andrology Society (CFAS, and Royal College of Obstetricians and Gynaecologists (RCOG. Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians.

  20. Data distribution architecture based on standard real time protocol

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense No. 22, 28040 Madrid (Spain)], E-mail: rodrigo.castro@ciemat.es; Vega, J.; Pereira, A.; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense No. 22, 28040 Madrid (Spain)

    2009-06-15

    Data distribution architecture (DDAR) has been designed conforming to new requirements, taking into account the type of data that is going to be generated from experiments in International Thermonuclear Experimental Reactor (ITER). The main goal of this architecture is to implement a system that is able to manage on line all data that is being generated by an experiment, supporting its distribution for: processing, storing, analysing or visualizing. The first objective is to have a distribution architecture that supports long pulse experiments (even hours). The described system is able to distribute, using real time protocol (RTP), stored data or live data generated while the experiment is running. It enables researchers to access data on line instead of waiting for the end of the experiment. Other important objective is scalability, so the presented architecture can easily grow based on actual necessities, simplifying estimation and design tasks. A third important objective is security. In this sense, the architecture is based on standards, so complete security mechanisms can be applied, from secure transmission solutions until elaborated access control policies, and it is full compatible with multi-organization federation systems as PAPI or Shibboleth.

  1. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  2. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  4. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  5. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  6. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  7. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  8. Hemangiopericytoma - The need for a protocol-based treatment plan

    Directory of Open Access Journals (Sweden)

    Murugesan Krishnan

    2011-01-01

    Full Text Available Hemangiopericytoma is a vascular tumor which comprises only 1% of all vascular tumors. The frequency of occurrence in the head and neck accounts for about 16-33% of all hemangiopericytomas. In this paper we discuss the surgical management, the difficulties in decision-making and treatment-planning in a case of a maxillary tumor in a five-year-old boy with a two-year follow-up. A five-year-old boy presented with a large unilateral maxillary tumor with nasal obstruction. Computed tomography revealed a heterogeneous mass completely occupying the right maxillary sinus and displacing the lateral wall of the nose and nasal septum. The lesion was diagnosed as hemangiopericytoma after histopathological confirmation. The option of surgical resection (total maxillectomy was carried out after evaluating the available literature. Various treatment modalities like surgery, chemotherapy and radiotherapy were taken into consideration as the tumor has an aggressive nature. Due to the inadequate literature on definitive treatment options for these types of tumors, there was difficulty in arriving at a protocol-based treatment plan.

  9. Quantum secret information equal exchange protocol based on dense coding

    Science.gov (United States)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  10. Perturbation based Monte Carlo criticality search in density, enrichment and concentration

    International Nuclear Information System (INIS)

    Li, Zeguang; Wang, Kan; Deng, Jingkang

    2015-01-01

    Highlights: • A new perturbation based Monte Carlo criticality search method is proposed. • The method could get accurate results with only one individual criticality run. • The method is used to solve density, enrichment and concentration search problems. • Results show the feasibility and good performances of this method. • The relationship between results’ accuracy and perturbation order is discussed. - Abstract: Criticality search is a very important aspect in reactor physics analysis. Due to the advantages of Monte Carlo method and the development of computer technologies, Monte Carlo criticality search is becoming more and more necessary and feasible. Existing Monte Carlo criticality search methods need large amount of individual criticality runs and may have unstable results because of the uncertainties of criticality results. In this paper, a new perturbation based Monte Carlo criticality search method is proposed and discussed. This method only needs one individual criticality calculation with perturbation tallies to estimate k eff changing function using initial k eff and differential coefficients results, and solves polynomial equations to get the criticality search results. The new perturbation based Monte Carlo criticality search method is implemented in the Monte Carlo code RMC, and criticality search problems in density, enrichment and concentration are taken out. Results show that this method is quite inspiring in accuracy and efficiency, and has advantages compared with other criticality search methods

  11. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  12. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  13. Uranium enrichment plans

    International Nuclear Information System (INIS)

    Thomas, D.C.; Gagne, R.W.

    1978-01-01

    The following topics are covered: the status of the Government's existing uranium enrichment services contracts, natural uranium requirements based on the latest contract information, uncertainty in predicting natural uranium requirements based on uranium enrichment contracts, and domestic and foreign demand assumed in enrichment planning

  14. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  15. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  16. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    International Nuclear Information System (INIS)

    Stumpf, Taisa R.; Pértile, Renata A.N.; Rambo, Carlos R.; Porto, Luismar M.

    2013-01-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology

  17. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    Energy Technology Data Exchange (ETDEWEB)

    Stumpf, Taisa R.; Pértile, Renata A.N. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil); Rambo, Carlos R., E-mail: rambo@intelab.ufsc.br [Department of Electrical Engineering, Federal University of Santa Catarina, Florianópolis 88040-900 (Brazil); Porto, Luismar M. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil)

    2013-12-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology.

  18. Exercise and nutrition routine improving cancer health (ENRICH: The protocol for a randomized efficacy trial of a nutrition and physical activity program for adult cancer survivors and carers

    Directory of Open Access Journals (Sweden)

    Boyes Allison

    2011-04-01

    Full Text Available Abstract Background The Exercise and Nutrition Routine Improving Cancer Health (ENRICH study is investigating a novel lifestyle intervention aimed at improving the health behaviors of adult cancer survivors and their carers. The main purpose of the study is to determine the efficacy of lifestyle education and skill development delivered via group-based sessions on the physical activity and dietary behaviors of participants. This article describes the intervention development, study design, and participant recruitment. Methods/Design ENRICH is a randomized controlled trial, conducted in Australia, with two arms: an intervention group participating in six, two-hour face-to-face sessions held over eight weeks, and a wait-list control group. Intervention sessions are co-facilitated by an exercise physiologist and dietician. Content includes healthy eating education, and a home-based walking (utilizing a pedometer and resistance training program (utilizing elastic tubing resistance devices. The program was developed with reference to social cognitive theory and chronic disease self-management models. The study population consists of cancer survivors (post active-treatment and their carers recruited through community-based advertising and referral from health professionals. The primary outcome is seven-days of sealed pedometry. Secondary outcomes include: self-reported physical activity levels, dietary intake, sedentary behavior, waist circumference, body mass index, quality of life, and perceived social support. The outcomes will be measured at baseline (one week prior to attending the program, eight-weeks (at completion of intervention sessions, and 20-weeks. The intervention group will also be invited to complete 12-month follow-up data collection. Process evaluation data will be obtained from participants by questionnaire and attendance records. Discussion No trials are yet available that have evaluated the efficacy of group-based lifestyle

  19. A uranium enrichment facility safeguards technology based on the separation nozzle process

    International Nuclear Information System (INIS)

    Bahm, W.; Weppner, J.; Didier, H.J.

    1979-01-01

    Under the Trilateral Agreement between Brazil, the Federal Republic of Germany and the IAEA an enrichment plant operating on the basis of the separation nozzle process, will be safeguarded under INFCIRC/66/Rev.2. For nuclear materials balancing purposes the plant has been subdivided into 17 key measuring points to assess the nuclear material flow and the nuclear material inventory. Preliminary studies have indicated that the balancing accuracy required for safeguards purposes cannot be achieved by only using the foreseen in-plant measuring systems, since considerable quantities of enriched uranium cannot be covered in this way. This fraction will merely be estimated by the operator and thus cannot be verified by the inspection authorities. The plant components, whose inventories could not be verified in the first estimate of the balancing accuracy referred to above by means of the in-plant measuring systems, also include the low-temperature separators of the cascade shoulder and the product. Assessing and verifying the inventories of these key measuring points is particularly important because of the enrichment (some 3% 235 U for the product) and the relatively large inventory and, hence, the considerable contribution to the balancing inaccuracy. An estimate of the balancing inaccuracy on the basis of the measuring uncertainties to be expected in the light of the present status of technology indicated values between 0.2 and 0.3% relative to the feed flow with semi-annual inventory-taking. However, this is based on the condition that the experiments planned to determine the inventories of cryogenic separators confirm the measuring uncertainties underlying the calculation

  20. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  1. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  2. Gene-ontology enrichment analysis in two independent family-based samples highlights biologically plausible processes for autism spectrum disorders.

    LENUS (Irish Health Repository)

    Anney, Richard J L

    2012-02-01

    Recent genome-wide association studies (GWAS) have implicated a range of genes from discrete biological pathways in the aetiology of autism. However, despite the strong influence of genetic factors, association studies have yet to identify statistically robust, replicated major effect genes or SNPs. We apply the principle of the SNP ratio test methodology described by O\\'Dushlaine et al to over 2100 families from the Autism Genome Project (AGP). Using a two-stage design we examine association enrichment in 5955 unique gene-ontology classifications across four groupings based on two phenotypic and two ancestral classifications. Based on estimates from simulation we identify excess of association enrichment across all analyses. We observe enrichment in association for sets of genes involved in diverse biological processes, including pyruvate metabolism, transcription factor activation, cell-signalling and cell-cycle regulation. Both genes and processes that show enrichment have previously been examined in autistic disorders and offer biologically plausibility to these findings.

  3. Validation of internal dosimetry protocols based on stochastic method

    International Nuclear Information System (INIS)

    Mendes, Bruno M.; Fonseca, Telma C.F.; Almeida, Iassudara G.; Trindade, Bruno M.; Campos, Tarcisio P.R.

    2015-01-01

    Computational phantoms adapted to Monte Carlo codes have been applied successfully in radiation dosimetry fields. NRI research group has been developing Internal Dosimetry Protocols - IDPs, addressing distinct methodologies, software and computational human-simulators, to perform internal dosimetry, especially for new radiopharmaceuticals. Validation of the IDPs is critical to ensure the reliability of the simulations results. Inter comparisons of data from literature with those produced by our IDPs is a suitable method for validation. The aim of this study was to validate the IDPs following such inter comparison procedure. The Golem phantom has been reconfigured to run on MCNP5. The specific absorbed fractions (SAF) for photon at 30, 100 and 1000 keV energies were simulated based on the IDPs and compared with reference values (RV) published by Zankl and Petoussi-Henss, 1998. The SAF average differences from RV and those obtained in IDP simulations was 2.3 %. The SAF largest differences were found in situations involving low energy photons at 30 keV. The Adrenals and thyroid, i.e. the lowest mass organs, had the highest SAF discrepancies towards RV as 7.2 % and 3.8 %, respectively. The statistic differences of SAF applying our IDPs from reference values were considered acceptable at the 30, 100 and 1000 keV spectra. We believe that the main reason for the discrepancies in IDPs run, found in lower masses organs, was due to our source definition methodology. Improvements of source spatial distribution in the voxels may provide outputs more consistent with reference values for lower masses organs. (author)

  4. Validation of internal dosimetry protocols based on stochastic method

    Energy Technology Data Exchange (ETDEWEB)

    Mendes, Bruno M.; Fonseca, Telma C.F., E-mail: bmm@cdtn.br [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil); Almeida, Iassudara G.; Trindade, Bruno M.; Campos, Tarcisio P.R., E-mail: tprcampos@yahoo.com.br [Universidade Federal de Minas Gerais (DEN/UFMG), Belo Horizonte, MG (Brazil). Departamento de Engenharia Nuclear

    2015-07-01

    Computational phantoms adapted to Monte Carlo codes have been applied successfully in radiation dosimetry fields. NRI research group has been developing Internal Dosimetry Protocols - IDPs, addressing distinct methodologies, software and computational human-simulators, to perform internal dosimetry, especially for new radiopharmaceuticals. Validation of the IDPs is critical to ensure the reliability of the simulations results. Inter comparisons of data from literature with those produced by our IDPs is a suitable method for validation. The aim of this study was to validate the IDPs following such inter comparison procedure. The Golem phantom has been reconfigured to run on MCNP5. The specific absorbed fractions (SAF) for photon at 30, 100 and 1000 keV energies were simulated based on the IDPs and compared with reference values (RV) published by Zankl and Petoussi-Henss, 1998. The SAF average differences from RV and those obtained in IDP simulations was 2.3 %. The SAF largest differences were found in situations involving low energy photons at 30 keV. The Adrenals and thyroid, i.e. the lowest mass organs, had the highest SAF discrepancies towards RV as 7.2 % and 3.8 %, respectively. The statistic differences of SAF applying our IDPs from reference values were considered acceptable at the 30, 100 and 1000 keV spectra. We believe that the main reason for the discrepancies in IDPs run, found in lower masses organs, was due to our source definition methodology. Improvements of source spatial distribution in the voxels may provide outputs more consistent with reference values for lower masses organs. (author)

  5. In vivo protein quality of selected cereal-based staple foods enriched with soybean proteins

    Directory of Open Access Journals (Sweden)

    Laura Acevedo-Pacheco

    2016-10-01

    Full Text Available Background: One way to diminish protein malnutrition in children is by enriching cereal-based flours for the manufacturing of maize tortillas, wheat flour tortillas, and yeast-leavened breads, which are widely consumed among low socio-economic groups. Objective: The aim was to determine and compare the essential amino acid (EAA scores, protein digestibility corrected amino acid scores (PDCAAS, and in vivo protein quality (protein digestibility, protein efficiency ratio (PER, biological values (BV, and net protein utilization (NPU values of regular versus soybean-fortified maize tortillas, yeast-leavened bread, and wheat flour tortillas. Design: To comparatively assess differences in protein quality among maize tortillas, wheat flour tortillas, and yeast-leavened breads, EAA compositions and in vivo studies with weanling rats were performed. The experimental diets based on regular or soybean-fortified food products were compared with a casein-based diet. Food intake, weight gains, PER, dry matter and protein digestibility, BV, NPU, and PDCAAS were assessed. The soybean-fortified tortillas contained 6% of defatted soybean flour, whereas the yeast-leavened bread flour contained 4.5% of soybean concentrate. Results: The soybean-fortified tortillas and bread contained higher amounts of lysine and tryptophan, which improved their EAA scores and PDCAAS. Rats fed diets based on soybean-fortified maize or wheat tortillas gained considerably more weight and had better BV and NPU values compared with counterparts fed with respective regular products. As a result, fortified maize tortillas and wheat flour tortillas improved PER from 0.73 to 1.64 and 0.69 to 1.77, respectively. The PER improvement was not as evident in rats fed the enriched yeast-leavened bread because the formulation contained sugar that decreased lysine availability possibly to Maillard reactions. Conclusions: The proposed enrichment of cereal-based foods with soybean proteins greatly

  6. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  7. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  8. A disposition strategy for highly enriched, aluminum-based fuel from research and test reactors

    International Nuclear Information System (INIS)

    McKibben, J.M.; Gould, T.H.; McDonell, W.R.; Bickford, W.E.

    1994-01-01

    The strategy proposed in this paper offers the Department of Energy an approach for disposing of aluminum-based, highly enriched uranium (HEU) spent fuels from foreign and domestic research reactors. The proposal is technically, socially, and economically sound. If implemented, it would advance US non-proliferation goals while also disposing of the spent fuel's waste by timely and proven methods using existing technologies and facilities at SRS without prolonged and controversial storage of the spent fuel. The fuel would be processed through 221-H. The radioactive fission products (waste) would be treated along with existing SRS high level waste by vitrifying it as borosilicate glass in the Defense Waste Processing Facility (DWPF) for disposal in the national geological repository. The HEU would be isotopically diluted, during processing, to low-enriched uranium (LEU) which can not be used to make weapons, thus eliminating proliferation concerns. The LEU can be sold to fabricators of either research reactor fuel or commercial power fuel. This proposed processing-LEU recycle approach has several important advantages over other alternatives, including: Lowest capital investment; lowest net total cost; quickest route to acceptable waste form and final geologic disposal; and likely lowest safety, health, and environmental impacts

  9. Pros and cons of methylation-based enrichment methods for ancient DNA

    Science.gov (United States)

    Seguin-Orlando, Andaine; Gamba, Cristina; Sarkissian, Clio Der; Ermini, Luca; Louvel, Guillaume; Boulygina, Eugenia; Sokolov, Alexey; Nedoluzhko, Artem; Lorenzen, Eline D.; Lopez, Patricio; McDonald, H. Gregory; Scott, Eric; Tikhonov, Alexei; Stafford,, Thomas W.; Alfarhan, Ahmed H.; Alquraishi, Saleh A.; Al-Rasheid, Khaled A. S.; Shapiro, Beth; Willerslev, Eske; Prokhortchouk, Egor; Orlando, Ludovic

    2015-01-01

    The recent discovery that DNA methylation survives in fossil material provides an opportunity for novel molecular approaches in palaeogenomics. Here, we apply to ancient DNA extracts the probe-independent Methylated Binding Domains (MBD)-based enrichment method, which targets DNA molecules containing methylated CpGs. Using remains of a Palaeo-Eskimo Saqqaq individual, woolly mammoths, polar bears and two equine species, we confirm that DNA methylation survives in a variety of tissues, environmental contexts and over a large temporal range (4,000 to over 45,000 years before present). MBD enrichment, however, appears principally biased towards the recovery of CpG-rich and long DNA templates and is limited by the fast post-mortem cytosine deamination rates of methylated epialleles. This method, thus, appears only appropriate for the analysis of ancient methylomes from very well preserved samples, where both DNA fragmentation and deamination have been limited. This work represents an essential step toward the characterization of ancient methylation signatures, which will help understanding the role of epigenetic changes in past environmental and cultural transitions. PMID:26134828

  10. BiNChE: a web tool and library for chemical enrichment analysis based on the ChEBI ontology.

    Science.gov (United States)

    Moreno, Pablo; Beisken, Stephan; Harsha, Bhavana; Muthukrishnan, Venkatesh; Tudose, Ilinca; Dekker, Adriano; Dornfeldt, Stefanie; Taruttis, Franziska; Grosse, Ivo; Hastings, Janna; Neumann, Steffen; Steinbeck, Christoph

    2015-02-21

    Ontology-based enrichment analysis aids in the interpretation and understanding of large-scale biological data. Ontologies are hierarchies of biologically relevant groupings. Using ontology annotations, which link ontology classes to biological entities, enrichment analysis methods assess whether there is a significant over or under representation of entities for ontology classes. While many tools exist that run enrichment analysis for protein sets annotated with the Gene Ontology, there are only a few that can be used for small molecules enrichment analysis. We describe BiNChE, an enrichment analysis tool for small molecules based on the ChEBI Ontology. BiNChE displays an interactive graph that can be exported as a high-resolution image or in network formats. The tool provides plain, weighted and fragment analysis based on either the ChEBI Role Ontology or the ChEBI Structural Ontology. BiNChE aids in the exploration of large sets of small molecules produced within Metabolomics or other Systems Biology research contexts. The open-source tool provides easy and highly interactive web access to enrichment analysis with the ChEBI ontology tool and is additionally available as a standalone library.

  11. A Technology Based Program That Matches Enrichment Resources With Student Strengths

    Directory of Open Access Journals (Sweden)

    J.S. Renzulli

    2007-09-01

    Full Text Available Remarkable advances in instructionalcommunication technology (ICT have now made ispossible to provide high levels of enrichment and thekinds of curricular differentiation that facilitateadvanced learning services to students who have accessto a computer and the Internet. But in order tomaximize the potential if ICT it is necessary to constructprograms that are based on learning theory that goesbeyond the didactic and prescriptive models that haveresulted in too much worksheets-on-line and electronicencyclopedias. The Renzulli Learning System (RLSuses a strength-based learning theory called theEnrichment Triad Model that is purposefully designedto promote advanced level learning, creativeproductivity, and high levels of student engagement byfocusing on the application of knowledge rather than themere acquisition and storage of information.The Renzulli Learning System is acomprehensive program that begins by providing acomputer-generated profile of each student’s academicstrengths, interests, learning styles, and preferred modesof expression. A search engine then matches Internetresources to the student’s profile from fourteen carefullyscreened data bases that are categorized by subject area,grade level, state curricular standards, and degree ofcomplexity. There are also hundreds of enrichmentactivities that can be down loaded and reproduced forindividual or group learning activities. A managementsystem called the Wizard Project Maker guides studentsin the application of knowledge to teacher or studentselected assignments, independent research studies, orcreative projects that individuals or small groups wouldlike to pursue. Students and teachers can evaluate thequality of students’ products using a rubric called TheStudent Product Assessment Form. Students can rateeach site visited, conduct a self-assessment of what theyhave gained from the site, and place resources in theirown Total talent Portfolio for future use. RLS alsoincludes a

  12. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  13. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  14. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  15. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  16. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  17. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  18. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  19. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  20. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  1. Inquiry-Based Science and Technology Enrichment Program: Green Earth Enhanced with Inquiry and Technology

    Science.gov (United States)

    Kim, Hanna

    2011-12-01

    This study investigated the effectiveness of a guided inquiry integrated with technology, in terms of female middle-school students' attitudes toward science/scientists and content knowledge regarding selective science concepts (e.g., Greenhouse Effect, Air/Water Quality, Alternative Energy, and Human Health). Thirty-five female students who were entering eighth grade attended an intensive, 1-week Inquiry-Based Science and Technology Enrichment Program which used a main theme, "Green Earth Enhanced with Inquiry and Technology." We used pre- and post-attitude surveys, pre- and post-science content knowledge tests, and selective interviews to collect data and measure changes in students' attitudes and content knowledge. The study results indicated that at the post-intervention measures, participants significantly improved their attitudes toward science and science-related careers and increased their content knowledge of selected science concepts ( p < .05).

  2. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  3. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  4. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  5. SNP-based pathway enrichment analysis for genome-wide association studies

    Directory of Open Access Journals (Sweden)

    Potkin Steven G

    2011-04-01

    Full Text Available Abstract Background Recently we have witnessed a surge of interest in using genome-wide association studies (GWAS to discover the genetic basis of complex diseases. Many genetic variations, mostly in the form of single nucleotide polymorphisms (SNPs, have been identified in a wide spectrum of diseases, including diabetes, cancer, and psychiatric diseases. A common theme arising from these studies is that the genetic variations discovered by GWAS can only explain a small fraction of the genetic risks associated with the complex diseases. New strategies and statistical approaches are needed to address this lack of explanation. One such approach is the pathway analysis, which considers the genetic variations underlying a biological pathway, rather than separately as in the traditional GWAS studies. A critical challenge in the pathway analysis is how to combine evidences of association over multiple SNPs within a gene and multiple genes within a pathway. Most current methods choose the most significant SNP from each gene as a representative, ignoring the joint action of multiple SNPs within a gene. This approach leads to preferential identification of genes with a greater number of SNPs. Results We describe a SNP-based pathway enrichment method for GWAS studies. The method consists of the following two main steps: 1 for a given pathway, using an adaptive truncated product statistic to identify all representative (potentially more than one SNPs of each gene, calculating the average number of representative SNPs for the genes, then re-selecting the representative SNPs of genes in the pathway based on this number; and 2 ranking all selected SNPs by the significance of their statistical association with a trait of interest, and testing if the set of SNPs from a particular pathway is significantly enriched with high ranks using a weighted Kolmogorov-Smirnov test. We applied our method to two large genetically distinct GWAS data sets of schizophrenia, one

  6. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  7. Deep Random based Key Exchange protocol resisting unlimited MITM

    OpenAIRE

    de Valroger, Thibault

    2018-01-01

    We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resis...

  8. Smart Traffic Management Protocol Based on VANET architecture

    Directory of Open Access Journals (Sweden)

    Amilcare Francesco Santamaria

    2014-01-01

    Full Text Available Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V and (V2I communications. We design a network protocol called (STMP that takes advantages of IEEE 802.11p standard. On each road several sensors system are placed and they are responsible of monitoring. Gathered data are spread in the network exploiting ad-hoc protocol messages. The increasing knowledge about environment conditions make possible to take preventive actions. Moreover, having a realtime monitoring of the lanes it is possible to reveal roads and city blocks congestions in a shorter time. An external entity to the (VANET is responsible to manage traffic and rearrange traffic along the lanes of the city avoiding huge traffic levels.

  9. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  10. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  11. Alkaline Peptone Water-Based Enrichment Method for mcr-3 From Acute Diarrheic Outpatient Gut Samples

    Directory of Open Access Journals (Sweden)

    Qiaoling Sun

    2018-05-01

    Full Text Available A third plasmid-mediated colistin resistance gene, mcr-3, is increasingly being reported in Enterobacteriaceae and Aeromonas spp. from animals and humans. To investigate the molecular epidemiology of mcr in the gut flora of Chinese outpatients, 152 stool specimens were randomly collected from outpatients in our hospital from May to June, 2017. Stool specimens enriched in alkaline peptone water or Luria-Bertani (LB broth were screened for mcr-1, mcr-2, and mcr-3 using polymerase chain reaction (PCR-based assays. Overall, 19.1% (29/152 and 5.3% (8/152 of the stool samples enriched in alkaline peptone water were PCR-positive for mcr-1 and mcr-3, respectively, while 2.7% (4/152 of samples were positive for both mcr-1 and mcr-3. Strains isolated from the samples that were both mcr-1- and mcr-3-positive were subjected to antimicrobial susceptibility testing by broth microdilution. They were also screened for the presence of other resistance genes by PCR, while multilocus sequence typing and whole-genome sequencing were used to investigate the molecular epidemiology and genetic environment, respectively, of the resistance genes. mcr-3-positive Aeromonas veronii strain 126-14, containing a mcr-3.8-mcr-3-like2 segment, and mcr-1-positive Escherichia coli strain 126-1, belonging to sequence type 1485, were isolated from the sample from a diarrheic butcher with no history of colistin treatment. A. veronii 126-14 had a colistin minimum inhibitory concentration (MIC of 2 µg/mL and was susceptible to antibiotics in common use, while E. coli 126-1 produced TEM-1, CTX-M-55, and CTX-M-14 β-lactamases and was resistant to colistin, ceftazidime, and cefotaxime. Overall, there was a higher detection rate of mcr-3-carrying strains with low colistin MICs from the samples enriched in alkaline peptone water than from samples grown in LB broth.

  12. Uranium enrichment

    International Nuclear Information System (INIS)

    1991-08-01

    This paper reports that in 1990 the Department of Energy began a two-year project to illustrate the technical and economic feasibility of a new uranium enrichment technology-the atomic vapor laser isotope separation (AVLIS) process. GAO believes that completing the AVLIS demonstration project will provide valuable information about the technical viability and cost of building an AVLIS plant and will keep future plant construction options open. However, Congress should be aware that DOE still needs to adequately demonstrate AVLIS with full-scale equipment and develop convincing cost projects. Program activities, such as the plant-licensing process, that must be completed before a plant is built, could take many years. Further, an updated and expanded uranium enrichment analysis will be needed before any decision is made about building an AVLIS plant. GAO, which has long supported legislation that would restructure DOE's uranium enrichment program as a government corporation, encourages DOE's goal of transferring AVLIS to the corporation. This could reduce the government's financial risk and help ensure that the decision to build an AVLIS plant is based on commercial concerns. DOE, however, has no alternative plans should the government corporation not be formed. Further, by curtailing a planned public access program, which would have given private firms an opportunity to learn about the technology during the demonstration project, DOE may limit its ability to transfer AVLIS to the private sector

  13. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Directory of Open Access Journals (Sweden)

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  14. Machine learning approaches to supporting the identification of photoreceptor-enriched genes based on expression data

    Directory of Open Access Journals (Sweden)

    Simpson David

    2006-03-01

    Full Text Available Abstract Background Retinal photoreceptors are highly specialised cells, which detect light and are central to mammalian vision. Many retinal diseases occur as a result of inherited dysfunction of the rod and cone photoreceptor cells. Development and maintenance of photoreceptors requires appropriate regulation of the many genes specifically or highly expressed in these cells. Over the last decades, different experimental approaches have been developed to identify photoreceptor enriched genes. Recent progress in RNA analysis technology has generated large amounts of gene expression data relevant to retinal development. This paper assesses a machine learning methodology for supporting the identification of photoreceptor enriched genes based on expression data. Results Based on the analysis of publicly-available gene expression data from the developing mouse retina generated by serial analysis of gene expression (SAGE, this paper presents a predictive methodology comprising several in silico models for detecting key complex features and relationships encoded in the data, which may be useful to distinguish genes in terms of their functional roles. In order to understand temporal patterns of photoreceptor gene expression during retinal development, a two-way cluster analysis was firstly performed. By clustering SAGE libraries, a hierarchical tree reflecting relationships between developmental stages was obtained. By clustering SAGE tags, a more comprehensive expression profile for photoreceptor cells was revealed. To demonstrate the usefulness of machine learning-based models in predicting functional associations from the SAGE data, three supervised classification models were compared. The results indicated that a relatively simple instance-based model (KStar model performed significantly better than relatively more complex algorithms, e.g. neural networks. To deal with the problem of functional class imbalance occurring in the dataset, two data re

  15. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  16. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  17. BIM-based Modeling and Data Enrichment of Classical Architectural Buildings

    Directory of Open Access Journals (Sweden)

    Fabrizio Ivan Apollonio

    2012-12-01

    Full Text Available EnIn this paper we presented a BIM-based approach for the documentation of Architectural Heritage. Knowledge of classical architecture is first extracted from the treatises for parametric modeling in object level. Then we established a profile library based on semantic studies to sweep out different objects. Variants grow out from the parametric models by editing or regrouping parameters based on grammars. Multiple data including material, structure and real-life state are enriched with respect to different research motivations. The BIM models are expected to ease the modeling process and provide comprehensive data shared among different platforms for further simulations.ItIn questo articolo è presentata una procedura definita nell'ambito dei sistemi BIM con l'obiettivo di documentare il Patrimonio Architettonico. I dati conoscitivi relativi all'architettura classica sono, in una prima fase, ottenuti dai trattati al fine di modellare in maniera parametrica a livello di oggetti. Successivamente è stata definita una libreria di profili, basata su principi semantici, dalla quale è possibile ottenere oggetti differenti. Dati di natura differente, relativi ad esempio ai materiali, alle strutture, allo stato di fatto, sono implementati in funzione delle differenti esigenze. I modelli BIM hanno la potenzialità di facilitare le procedure di modellazione e di fornire informazioni e dati completi che possono essere condivisi tra piattaforme differenti per ulteriori simulazioni ed analisi.

  18. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  19. Implementation of an Evidence-Based Protocol for Surgical Infection Prophylaxis

    National Research Council Canada - National Science Library

    Savino, John A; Smeland, Jane; Flink, Ellen L; Ruperto, Angelo; Hines, Amanda; Sullivan, Thomas; Galvin, Kerri; Risucci, Donald A

    2005-01-01

    An evidence-based surgical antimicrobial prophylaxis (AMP) protocol was implemented in multiple facilities to determine if compliance led to a decrease in New York State reportable surgical site infections (SSIs...

  20. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  1. A Cloud-User Protocol Based on Ciphertext Watermarking Technology

    Directory of Open Access Journals (Sweden)

    Keyang Liu

    2017-01-01

    Full Text Available With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS. Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP, into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.

  2. STRESS TESTS FOR VIDEOSTREAMING SERVICES BASED ON RTSP PROTOCOL

    Directory of Open Access Journals (Sweden)

    Gabriel Elías Chanchí Golondrino

    2015-11-01

    Full Text Available Video-streaming is a technology with major implications these days in such diverse contexts as education, health and the business sector; all of this regarding the ease it provides for remote access to live or recorded media content, allowing communication regardless of geographic location. One standard protocol that enables implementation of this technology is real time streaming protocol, or RTSP. However, since most application servers and Internet services are supported on HTTP requests, very little research has been done on generating tools for carrying out stress tests on streaming servers. This paper presents a stress measuring tool called Hermes, developed in Python, which allows calculation of response times for establishing RTSP connections to streaming servers, as well as obtaining RAM memory consumption and CPU usage rate data from these servers. Hermes was deployed in a video-streaming environment where stress testing was carried out on the LIVE555 server, using calls in the background to VLC and OpenRTSP open source clients. 

  3. Aptamer based peptide enrichment for quantitative analysis of gonadotropin-releasing hormone by LC-MS/MS.

    Science.gov (United States)

    Richards, S L; Cawley, A T; Cavicchioli, R; Suann, C J; Pickford, R; Raftery, M J

    2016-04-01

    Over recent years threats to racing have expanded to include naturally occurring biological molecules, such as peptides and proteins, and their synthetic analogues. Traditionally, antibodies have been used to enable detection of these compounds as they allow purification and concentration of the analyte of interest. The rapid expansion of peptide-based therapeutics necessitates a similarly rapid development of suitable antibodies or other means of enrichment. Potential alternative enrichment strategies include the use of aptamers, which offer the significant advantage of chemical synthesis once the nucleic acid sequence is known. A method was developed for the enrichment, detection and quantitation of gonadotropin-releasing hormone (GnRH) in equine urine using aptamer-based enrichment and LC-MS/MS. The method achieved comparable limits of detection (1 pg/mL) and quantification (2.5 pg/mL) to previously published antibody-based enrichment methods. The intra- and inter-assay precision achieved was less than 10% at both 5 and 20 pg/mL, and displayed a working dynamic range of 2.5-100 pg/mL. Significant matrix enhancement (170 ± 8%) and low analytical recovery (29 ± 15%) was observed, although the use of an isotopically heavy labelled GnRH peptide, GnRH (Pro(13)C5,(15)N), as the internal standard provides compensation for these parameters. Within the current limits of detection GnRH was detectable up to 1h post administration in urine and identification of a urinary catabolite extended this detection window to 4h. Based on the results of this preliminary investigation we propose the use of aptamers as a viable alternative to antibodies in the enrichment of peptide targets from equine urine. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  5. A Parzen window-based approach for the detection of locally enriched transcription factor binding sites.

    Science.gov (United States)

    Vandenbon, Alexis; Kumagai, Yutaro; Teraguchi, Shunsuke; Amada, Karlou Mar; Akira, Shizuo; Standley, Daron M

    2013-01-21

    Identification of cis- and trans-acting factors regulating gene expression remains an important problem in biology. Bioinformatics analyses of regulatory regions are hampered by several difficulties. One is that binding sites for regulatory proteins are often not significantly over-represented in the set of DNA sequences of interest, because of high levels of false positive predictions, and because of positional restrictions on functional binding sites with regard to the transcription start site. We have developed a novel method for the detection of regulatory motifs based on their local over-representation in sets of regulatory regions. The method makes use of a Parzen window-based approach for scoring local enrichment, and during evaluation of significance it takes into account GC content of sequences. We show that the accuracy of our method compares favourably to that of other methods, and that our method is capable of detecting not only generally over-represented regulatory motifs, but also locally over-represented motifs that are often missed by standard motif detection approaches. Using a number of examples we illustrate the validity of our approach and suggest applications, such as the analysis of weaker binding sites. Our approach can be used to suggest testable hypotheses for wet-lab experiments. It has potential for future analyses, such as the prediction of weaker binding sites. An online application of our approach, called LocaMo Finder (Local Motif Finder), is available at http://sysimm.ifrec.osaka-u.ac.jp/tfbs/locamo/.

  6. Two-Dimensional MoS2-Based Zwitterionic Hydrophilic Interaction Liquid Chromatography Material for the Specific Enrichment of Glycopeptides.

    Science.gov (United States)

    Xia, Chaoshuang; Jiao, Fenglong; Gao, Fangyuan; Wang, Heping; Lv, Yayao; Shen, Yehua; Zhang, Yangjun; Qian, Xiaohong

    2018-06-05

    Mass spectrometry (MS)-based glycoproteomics research requires highly efficient sample preparation to eliminate interference from non-glycopeptides and to improve the efficiency of glycopeptide detection. In this work, a novel MoS 2 /Au-NP (gold nanoparticle)-L-cysteine nanocomposite was prepared for glycopeptide enrichment. The two-dimensional (2D) structured MoS 2 nanosheets served as a matrix that could provide a large surface area for immobilizing hydrophilic groups (such as L-cysteine) with low steric hindrance between the materials and the glycopeptides. As a result, the novel nanomaterial possessed an excellent ability to capture glycopeptides. Compared to commercial zwitterionic hydrophilic interaction liquid chromatography (ZIC-HILIC) materials, the novel nanomaterials exhibited excellent enrichment performance with ultrahigh selectivity and sensitivity (approximately 10 fmol), high binding capacity (120 mg g -1 ), high enrichment recovery (more than 93%), satisfying batch-to-batch reproducibility, and good universality for glycopeptide enrichment. In addition, its outstanding specificity and efficiency for glycopeptide enrichment was confirmed by the detection of glycopeptides from an human serum immunoglobulin G (IgG) tryptic digest in quantities as low as a 1:1250 molar ratio of IgG tryptic digest to bovine serum albumin tryptic digest. The novel nanocomposites were further used for the analysis of complex samples, and 1920 glycopeptide backbones from 775 glycoproteins were identified in three replicate analyses of 50 μg of proteins extracted from HeLa cell exosomes. The resulting highly informative mass spectra indicated that this multifunctional nanomaterial-based enrichment method could be used as a promising tool for the in-depth and comprehensive characterization of glycoproteomes in MS-based glycoproteomics.

  7. NetGen: a novel network-based probabilistic generative model for gene set functional enrichment analysis.

    Science.gov (United States)

    Sun, Duanchen; Liu, Yinliang; Zhang, Xiang-Sun; Wu, Ling-Yun

    2017-09-21

    High-throughput experimental techniques have been dramatically improved and widely applied in the past decades. However, biological interpretation of the high-throughput experimental results, such as differential expression gene sets derived from microarray or RNA-seq experiments, is still a challenging task. Gene Ontology (GO) is commonly used in the functional enrichment studies. The GO terms identified via current functional enrichment analysis tools often contain direct parent or descendant terms in the GO hierarchical structure. Highly redundant terms make users difficult to analyze the underlying biological processes. In this paper, a novel network-based probabilistic generative model, NetGen, was proposed to perform the functional enrichment analysis. An additional protein-protein interaction (PPI) network was explicitly used to assist the identification of significantly enriched GO terms. NetGen achieved a superior performance than the existing methods in the simulation studies. The effectiveness of NetGen was explored further on four real datasets. Notably, several GO terms which were not directly linked with the active gene list for each disease were identified. These terms were closely related to the corresponding diseases when accessed to the curated literatures. NetGen has been implemented in the R package CopTea publicly available at GitHub ( http://github.com/wulingyun/CopTea/ ). Our procedure leads to a more reasonable and interpretable result of the functional enrichment analysis. As a novel term combination-based functional enrichment analysis method, NetGen is complementary to current individual term-based methods, and can help to explore the underlying pathogenesis of complex diseases.

  8. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  9. Feasibility study of an alkaline-based chemical treatment for the purification of polyhydroxybutyrate produced by a mixed enriched culture

    NARCIS (Netherlands)

    Jiang, Y.; Mikova, G.; Kleerebezem, R.; van der Wielen, L.A.M.; Cuellar, M.C.

    2015-01-01

    This study focused on investigating the feasibility of purifying polyhydroxybutyrate (PHB) from mixed culture biomass by alkaline-based chemical treatment. The PHB-containing biomass was enriched on acetate under non-sterile conditions. Alkaline treatment (0.2 M NaOH) together with surfactant SDS

  10. Feasibility study of an alkaline-based chemical treatment for the purification of polyhydroxybutyrate produced by a mixed enriched culture

    NARCIS (Netherlands)

    Jiang, Y.; Mikova, G.; Kleerebezem, R.; Van der Wielen, L.A.M.; Cuellar Soares, M.C.

    2015-01-01

    This study focused on investigating the feasibility of purifying polyhydroxybutyrate (PHB) from mixed culture biomass by alkaline-based chemical treatment. The PHB-containing biomass was enriched on acetate under non-sterile conditions. Alkaline treatment (0.2 M NaOH) together with surfactant SDS

  11. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  12. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  13. Combining auctions and performance-based payments in a forest enrichment field trial in Western Kenya.

    Science.gov (United States)

    Khalumba, Mercelyne; Wünscher, Tobias; Wunder, Sven; Büdenbender, Mirjam; Holm-Müller, Karin

    2014-06-01

    Cost-effectiveness is an important aspect in the assessment of payments for environmental services (PES) initiatives. In participatory field trials with communities in Western Kenya, we combined procurement auctions for forest enrichment contracts with performance-based payments and compared the outcomes with a baseline scenario currently used by the Kenyan Forest Service. Procurement auctions were the most cost-effective. The competitive nature of the auction reduced contracting expenses (provision costs), and the result-oriented payments provided additional incentives to care for the planted seedlings, resulting in their improved survival rates (service quantity). These gains clearly exceeded increases in transaction costs associated with conducting an auction. The number of income-poor auction participants and winners was disproportionately high and local institutional buy-in was remarkably strong. Our participatory approach may, however, require adaptations when conducted at a larger scale. Although the number of contracts we monitored was limited and prohibited the use of statistical tests, our study is one of the first to reveal the benefits of using auctions for PES in developing countries. © 2014 Society for Conservation Biology.

  14. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  15. Laser and gas centrifuge enrichment

    Energy Technology Data Exchange (ETDEWEB)

    Heinonen, Olli [Senior Fellow, Belfer Center for Science and International Affairs, Harvard Kennedy School, Cambridge, Massachusetts (United States)

    2014-05-09

    Principles of uranium isotope enrichment using various laser and gas centrifuge techniques are briefly discussed. Examples on production of high enriched uranium are given. Concerns regarding the possibility of using low end technologies to produce weapons grade uranium are explained. Based on current assessments commercial enrichment services are able to cover the global needs of enriched uranium in the foreseeable future.

  16. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  17. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  18. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    Science.gov (United States)

    2015-12-01

    more protocols (especially at different layers of the OSI model ), implementing an inference engine to extract inter- and intrapacket dependencies, and...ARL-TR-7543 ● DEC 2015 US Army Research Laboratory Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model ...ICMP) Model Generation for ns-3 by Jaime C Acosta and Felipe Jovel Survivability/Lethality Analysis Directorate, ARL Felipe Sotelo and Caesar

  19. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  20. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  1. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  2. DNA-based and culture-based characterization of a hydrocarbon-degrading consortium enriched from Arctic soil

    Energy Technology Data Exchange (ETDEWEB)

    Thomassin-Lacroix, E. J. M.; Reimer, K. J. [Royal Military College, Dept. of Chemistry and Chemical Engineering, Kingston, On (Canada); Yu, Z.; Mohn, W. W. [British Columbia Univ., Dept. of Microbiology and Immunology, Vancouver, BC (Canada); Eriksson, M. [Royal Inst. of Technology, Dept. of Biotechnology, Stockholm (Sweden)

    2001-12-01

    Oil spills are fairly common in polar tundra regions, including remote locations, and are a threat to the relatively fragile ecosystem. Remediation must be done economically and with minimum additional damage. Bioremediation is considered to be the appropriate technology, although its application in polar tundra regions is not well documented. Most studies of hydrocarbon remediation in polar regions have concerned marine oil spills, while a few studies have demonstrated on-site polar tundra soil remediation. A few of these demonstrated the presence of psychrotolerant hydrocarbon-degrading bacteria in polar tundra soils. Because fuels are complex mixtures of hydrocarbons, microbial consortia rather than pure cultures may be the most effective agents in degrading fuels. Despite their potential advantages for bioaugmentation applications, consortia are difficult to characterize and monitor. Molecular methods based on DNA analysis partially address these difficulties. One such approach is to randomly clone rRNA gene (rDNA) fragments and to sequence as a set of clones. The relative abundance of individual sequences in the clone library is related to the relative abundance of the corresponding organism in the community. In this study a psychrotolerant, fuel-degrading consortium was enriched with Arctic tundra soil. The enrichment substrate for the consortium was Jet A-1 fuel, which is very similar to Arctic diesel fuel, a common contaminant in the region. The objectives of the study were to (1) characterize thr consortium by DNA- and culture-based methods, (2) develop quantitative polymerase chain reaction assays for populations of predominant consortium members, and (3) determine the dynamics of those populations during incubation of the consortium. Result showed that is possible to quantitatively monitor members of a microbial consortium, with potential application for bioremediation of Arctic tundra soil. The relative abundance of consortium members was found to vary

  3. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  4. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  5. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  6. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  7. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  8. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  9. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  10. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  11. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  12. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network's transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  13. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  14. A combined enrichment/polymerase chain reaction based method for the routine screening of Streptococcus agalactiae in pregnant women

    Directory of Open Access Journals (Sweden)

    F.M. Munari

    2012-03-01

    Full Text Available Group B Streptococcus (GBS is the most common cause of life-threatening infection in neonates. Guidelines from CDC recommend universal screening of pregnant women for rectovaginal GBS colonization. The objective of this study was to compare the performance of a combined enrichment/PCR based method targeting the atr gene in relation to culture using enrichment with selective broth medium (standard method to identify the presence of GBS in pregnant women. Rectovaginal GBS samples from women at ≥36 weeks of pregnancy were obtained with a swab and analyzed by the two methods. A total of 89 samples were evaluated. The prevalence of positive results for GBS detection was considerable higher when assessed by the combined enrichment/PCR method than with the standard method (35.9% versus 22.5%, respectively. The results demonstrated that the use of selective enrichment broth followed by PCR targeting the atr gene is a highly sensitive, specific and accurate test for GBS screening in pregnant women, allowing the detection of the bacteria even in lightly colonized patients. This PCR methodology may provide a useful diagnostic tool for GBS detection and contributes for a more accurate and effective intrapartum antibiotic and lower newborn mortality and morbidity.

  15. CHIP: Commodity based Hazard Identification Protocol for emerging diseases in plants and animals

    NARCIS (Netherlands)

    Bremmer, J.; Swanenburg, M.; Galen, van M.A.; Hoek, Maarten; Rau, M.L.; Hennen, W.H.G.J.; Benninga, J.; Ge, L.; Breukers, M.L.H.

    2012-01-01

    This project comprised the development of a commodity-based hazard identification protocol for biological hazards in plants and animals as a decision support tree programmed in Excel. The content of the decision tree is based on the results of a systematic review of pest and pathogen

  16. Uranium enrichment

    International Nuclear Information System (INIS)

    1990-01-01

    This report looks at the following issues: How much Soviet uranium ore and enriched uranium are imported into the United States and what is the extent to which utilities flag swap to disguise these purchases? What are the U.S.S.R.'s enriched uranium trading practices? To what extent are utilities required to return used fuel to the Soviet Union as part of the enriched uranium sales agreement? Why have U.S. utilities ended their contracts to buy enrichment services from DOE?

  17. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  18. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  19. twzPEA: A Topology and Working Zone Based Pathway Enrichment Analysis Framework

    Science.gov (United States)

    Sensitive detection of involvement and adaptation of key signaling, regulatory, and metabolic pathways holds the key to deciphering molecular mechanisms such as those in the biomass-to-biofuel conversion process in yeast. Typical gene set enrichment analyses often do not use topology information in...

  20. Nutrient enrichment reduces constraints on material flows in a detritus-based food web

    Science.gov (United States)

    Wyatt F. Cross; Bruce Wallace; Amy D. Rosemond

    2007-01-01

    Most aquatic and terrestrial ecosystems are experiencing increased nutrient availability, which is affecting their structure and function. By altering community composition and productivity of consumers, enrichment can indirectly cause changes in the pathways and magnitude of material flows in food webs. These changes, in turn, have major consequences for material...

  1. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due ...

  2. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P open heart surgery.

  3. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  4. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  5. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  6. Physical and welding metallurgy of Gd-enriched austenitic alloys for spent nuclear fuel applications. Part II, nickel base alloys

    International Nuclear Information System (INIS)

    Mizia, Ronald E.; Michael, Joseph Richard; Williams, David Brian; Dupont, John Neuman; Robino, Charles Victor

    2004-01-01

    The physical and welding a metallurgy of gadolinium- (Gd-) enriched Ni-based alloys has been examined using a combination of differential thermal analysis, hot ductility testing. Varestraint testing, and various microstructural characterization techniques. Three different matrix compositions were chosen that were similar to commercial Ni-Cr-Mo base alloys (UNS N06455, N06022, and N06059). A ternary Ni-Cr-Gd alloy was also examined. The Gd level of each alloy was ∼2 wt-%. All the alloys initiated solidification by formation of primary austenite and terminated solidification by a Liquid γ + Ni 5 Gd eutectic-type reaction at ∼1270 C. The solidification temperature ranges of the alloys varied from ∼100 to 130 C (depending on alloy composition). This is a substantial reduction compared to the solidification temperature range to Gd-enriched stainless steels (360 to 400 C) that terminate solidification by a peritectic reaction at ∼1060 C. The higher-temperature eutectic reaction that occurs in the Ni-based alloys is accompanied by significant improvements in hot ductility and solidification cracking resistance. The results of this research demonstrate that Gd-enriched Ni-based alloys are excellent candidate materials for nuclear criticality control in spent nuclear fuel storage applications that require production and fabrication of large amounts of material through conventional ingot metallurgy and fusion welding techniques

  7. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  8. A School-Based Suicide Risk Assessment Protocol

    Science.gov (United States)

    Boccio, Dana E.

    2015-01-01

    Suicide remains the third leading cause of death among young people in the United States. Considering that youth who contemplate suicide generally exhibit warning signs before engaging in lethal self-harm, school-based mental health professionals can play a vital role in identifying students who are at risk for suicidal behavior. Nevertheless, the…

  9. Calibration of Community-based Coral Reef Monitoring Protocols ...

    African Journals Online (AJOL)

    Coral reef monitoring (CRM) has been recognised as an important management tool and has consequently been incorporated in Integrated Coastal Area Management (ICAM) programmes in the Western Indian Ocean (WIO). Community-based coral reef monitoring (CB-CRM), which uses simplified procedures suitable for ...

  10. Development of a community based management protocol for ...

    African Journals Online (AJOL)

    It is evident that water quality management would only be effective by changing the practices that contribute to diffuse pollution. This paper is based on a project that employed a systematic approach to involve and mobilise rural communities in water quality control programmes. The aim of the project is to develop ...

  11. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  12. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  13. History and Nature of Science enriched Problem-Based Learning on the origins of biodiversity and of continents and oceans

    OpenAIRE

    Sousa, Cristina

    2014-01-01

    [EN] The episode of the History of Science (HOS) on the theory of continental drift proposed by Alfred Wegener has been considered an excellent example for teaching students aspects of Nature of Science (NOS) and the relation of Science with social and tecnological contexts. We implemented a NOS and HOS-enriched Problem-Based Learning environment at the middle (year 7 of the Portuguese National Curriculum) and secondary level (year 10) for teaching the origins of biodiversity and of continent...

  14. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Science.gov (United States)

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  15. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  16. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  17. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  18. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  19. Highly specific purification of N-glycans using phosphate-based derivatization as an affinity tag in combination with Ti{sup 4+}-SPE enrichment for mass spectrometric analysis

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Ying [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Key Laboratory of Glycoconjugates Research Ministry of Public Health, Fudan University, Shanghai 200032 (China); Peng, Ye; Bin, Zhichao [Department of Chemistry, Fudan University, Shanghai 200032 (China); Wang, Huijie [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Lu, Haojie, E-mail: luhaojie@fudan.edu.cn [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Department of Chemistry, Fudan University, Shanghai 200032 (China); Key Laboratory of Glycoconjugates Research Ministry of Public Health, Fudan University, Shanghai 200032 (China)

    2016-08-31

    N-linked protein glycosylation is involved in regulation of a wide variety of cellular processes and associated with numerous diseases. Highly specific identification of N-glycome remains a challenge while its biological significance is acknowledged. The relatively low abundance of glycan in complex biological mixtures, lack of basic sites for protonation, and suppression by other highly abundant proteins/peptides lead to the particularly poor detection sensitivity of N-glycans in the MS analysis. Therefore, the highly specific purification procedure becomes a crucial step prior to MS analysis of the N-glycome. Herein, a novel N-glycans enrichment approach based on phosphate derivatization combined with Ti{sup 4+}-SPE (solid phase extraction) was developed. Briefly, in this strategy, N-glycans were chemically labeled with a phospho-group at their reducing ends, such that the Ti{sup 4+}-SPE microspheres were able to capture the phospho-containing glycans. The enrichment method was developed and optimized using model oligosaccharides (maltoheptaose DP7 and sialylated glycan A1) and also glycans from a standard glycoprotein (asialofetuin, ASF). This method experimentally showed high derivatization efficiency (almost 100%), excellent selectivity (analyzing DP7 in the digests of bovine serum albumin at a mass ratio of 1:100), high enriching recovery (90%), good reproducibility (CV<15%) as well as high sensitivity (LOD at fmol level). At last, the proposed method was successfully applied in the profiling of N-glycome in human serum, in which a total of 31 N-glycan masses were identified. - Graphical abstract: A selective enrichment method for the N-glycome is reported. N-glycans were chemically labeled with a phosphate derivatization reagent (AMS), then the phospho-containing glycans were enriched using Ti{sup 4+}-microspheres. - Highlights: • A highly specific N-glycans purification method based on phosphate derivatization combined with Ti{sup 4+}-SPE was developed

  20. Uranium enrichment

    International Nuclear Information System (INIS)

    1989-01-01

    GAO was asked to address several questions concerning a number of proposed uranium enrichment bills introduced during the 100th Congress. The bill would have restructured the Department of Energy's uranium enrichment program as a government corporation to allow it to compete more effectively in the domestic and international markets. Some of GAO's findings discussed are: uranium market experts believe and existing market models show that the proposed DOE purchase of a $750 million of uranium from domestic producers may not significantly increase production because of large producer-held inventories; excess uranium enrichment production capacity exists throughout the world; therefore, foreign producers are expected to compete heavily in the United States throughout the 1990s as utilities' contracts with DOE expire; and according to a 1988 agreement between DOE's Offices of Nuclear Energy and Defense Programs, enrichment decommissioning costs, estimated to total $3.6 billion for planning purposes, will be shared by the commercial enrichment program and the government

  1. Hydrogels Based on Ag+ -Modulated Assembly of 5'-Adenosine Monophosphate for Enriching Biomolecules.

    Science.gov (United States)

    Hu, Yuanyuan; Xie, Dong; Wu, Yang; Lin, Nangui; Song, Aixin; Hao, Jingcheng

    2017-11-07

    Supramolecular hydrogels obtained by combining 5'-adenosine monophosphate (AMP) with Ag + were fabricated in this work. Their gelation capability was enhanced by increasing the concentration of Ag + or decreasing the pH. The gels are very sensitive to light, which endows them with potential applications as visible-light photosensitive materials. Coordination between the nucleobase of AMP and Ag + , as well as π-π stacking of nucleobases, are considered to be the main driving forces for self-assembly. The hydrogels successfully achieved the encapsulation and enrichment of biomolecules. Hydrogen bonding between the amino group of guest molecules and silver nanoparticles along the nanofibers drives the enrichment and is considered to be a crucial interaction. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Winnowing DNA for rare sequences: highly specific sequence and methylation based enrichment.

    Directory of Open Access Journals (Sweden)

    Jason D Thompson

    Full Text Available Rare mutations in cell populations are known to be hallmarks of many diseases and cancers. Similarly, differential DNA methylation patterns arise in rare cell populations with diagnostic potential such as fetal cells circulating in maternal blood. Unfortunately, the frequency of alleles with diagnostic potential, relative to wild-type background sequence, is often well below the frequency of errors in currently available methods for sequence analysis, including very high throughput DNA sequencing. We demonstrate a DNA preparation and purification method that through non-linear electrophoretic separation in media containing oligonucleotide probes, achieves 10,000 fold enrichment of target DNA with single nucleotide specificity, and 100 fold enrichment of unmodified methylated DNA differing from the background by the methylation of a single cytosine residue.

  3. Winnowing DNA for rare sequences: highly specific sequence and methylation based enrichment.

    Science.gov (United States)

    Thompson, Jason D; Shibahara, Gosuke; Rajan, Sweta; Pel, Joel; Marziali, Andre

    2012-01-01

    Rare mutations in cell populations are known to be hallmarks of many diseases and cancers. Similarly, differential DNA methylation patterns arise in rare cell populations with diagnostic potential such as fetal cells circulating in maternal blood. Unfortunately, the frequency of alleles with diagnostic potential, relative to wild-type background sequence, is often well below the frequency of errors in currently available methods for sequence analysis, including very high throughput DNA sequencing. We demonstrate a DNA preparation and purification method that through non-linear electrophoretic separation in media containing oligonucleotide probes, achieves 10,000 fold enrichment of target DNA with single nucleotide specificity, and 100 fold enrichment of unmodified methylated DNA differing from the background by the methylation of a single cytosine residue.

  4. Isotope Enrichment Detection by Laser Ablation - Laser Absorption Spectrometry: Automated Environmental Sampling and Laser-Based Analysis for HEU Detection

    International Nuclear Information System (INIS)

    Anheier, Norman C.; Bushaw, Bruce A.

    2010-01-01

    The global expansion of nuclear power, and consequently the uranium enrichment industry, requires the development of new safeguards technology to mitigate proliferation risks. Current enrichment monitoring instruments exist that provide only yes/no detection of highly enriched uranium (HEU) production. More accurate accountancy measurements are typically restricted to gamma-ray and weight measurements taken in cylinder storage yards. Analysis of environmental and cylinder content samples have much higher effectiveness, but this approach requires onsite sampling, shipping, and time-consuming laboratory analysis and reporting. Given that large modern gaseous centrifuge enrichment plants (GCEPs) can quickly produce a significant quantity (SQ ) of HEU, these limitations in verification suggest the need for more timely detection of potential facility misuse. The Pacific Northwest National Laboratory (PNNL) is developing an unattended safeguards instrument concept, combining continuous aerosol particulate collection with uranium isotope assay, to provide timely analysis of enrichment levels within low enriched uranium facilities. This approach is based on laser vaporization of aerosol particulate samples, followed by wavelength tuned laser diode spectroscopy to characterize the uranium isotopic ratio through subtle differences in atomic absorption wavelengths. Environmental sampling (ES) media from an integrated aerosol collector is introduced into a small, reduced pressure chamber, where a focused pulsed laser vaporizes material from a 10 to 20-(micro)m diameter spot of the surface of the sampling media. The plume of ejected material begins as high-temperature plasma that yields ions and atoms, as well as molecules and molecular ions. We concentrate on the plume of atomic vapor that remains after the plasma has expanded and then cooled by the surrounding cover gas. Tunable diode lasers are directed through this plume and each isotope is detected by monitoring absorbance

  5. Nitrogen-enriched bituminous coal-based active carbons as materials for supercapacitors

    Energy Technology Data Exchange (ETDEWEB)

    R. Pietrzak; K. Jurewicz; P. Nowicki; K. Babel; H. Wachowska [A. Mickiewicz University, Poznan (Poland). Laboratory of Coal Chemistry and Technology

    2010-11-15

    The paper presents the results of a study on obtaining N-enriched active carbons from bituminous coal and on testing its use as an electrode material in supercapacitors. The coal was carbonised, activated with KOH and ammoxidised by a mixture of ammonia and air at the ratio 1:3 at 300{sup o}C or 350{sup o}C, at different stages of the production, that is, at those of precursor, carbonisate, and active carbon. The products were microporous N-enriched active carbon samples of well-developed surface area reaching from 1577 to 2510 m{sup 2}/g and containing 1.0 to 8.5 wt% of nitrogen. The XPS measurements have shown that in the active carbons enriched in nitrogen at the stage of precursor and at the stage of carbonisate, the dominant nitrogen species are the N-5 groups, while in the samples ammoxidised at the last stage of the treatment the dominant nitrogen species are the surface groups of imines and/or nitriles, probably accompanied by amines and amides. The paper reports the results of a comprehensive study of the effect of the structure and chemical composition of a series of active carbon samples of different properties on their capacity performance in water solutions of H{sub 2}SO{sub 4} or KOH, with the behaviour of positive and negative electrodes analysed separately. 33 refs., 7 figs., 8 tabs.

  6. DEVELOPMENT OF ENRICHMENT VERIFICATION ASSAY BASED ON THE AGE AND 235U AND 238U ACTIVITIES OF THE SAMPLES

    International Nuclear Information System (INIS)

    AL-YAMAHI, H.; EL-MONGY, S.A.

    2008-01-01

    Development of the enrichment verification methods is the backbone of the nuclear materials safeguards skeleton. In this study, the 235U percentage of depleted , natural and very slightly enriched uranium samples were estimated based on the sample age and the measured activity of 235U and 238U. The HpGe and NaI spectrometry were used for samples assay. A developed equation was derived to correlate the sample age and 235U and 238U activities with the enrichment percentage (E%). The results of the calculated E% by the deduced equation and the target E% values were found to be similar and within 0.58 -1.75% bias in the case of HpGe measurements. The correlation between them was found to be very sharp. The activity was also calculated based on the measured sample count rate and the efficiency at the gamma energies of interest. The correlation between the E% and the 235U activity was estimated and found to be linearly sharp. The results obtained by NaI was found to be less accurate than these obtained by HpGe. The bias in the case of NaI assay was in the range from 6.398% to 22.8% for E% verification

  7. Conversion of highly enriched uranium in thorium-232 based oxide fuel for light water reactors: MOX-T fuel

    Energy Technology Data Exchange (ETDEWEB)

    Vapirev, E; Jordanov, T; Khristoskov, I [Sofia Univ. (Bulgaria). Fizicheski Fakultet

    1996-12-31

    The possibility of using highly enriched uranium available from military inventories for production of mixed oxide fuel (MOX) has been proposed. The fuel is based on U-235 dioxide as fissile isotope and Th-232 dioxide as a non-fissile isotope. It is shown that although the fuel conversion coefficient to U-233 is expected to be less than 1, the proposed fuel has several important advantages resulting in cost reduction of the nuclear fuel cycle. The expected properties of MOX fuel (cross-sections, generated chains, delayed neutrons) are estimated. Due to fuel generation the initial enrichment is expected to be 1% less for production of the same energy. In contrast to traditional fuel no long living actinides are generated which reduces the disposal and reprocessing cost. 7 refs.

  8. Modification of Rat Lung Decellularization Protocol Based on Dynamic Conductometry of Working Solution.

    Science.gov (United States)

    Kuevda, E V; Gubareva, E A; Gumenyuk, I S; Sotnichenko, A S; Gilevich, I V; Nakokhov, R Z; Rusinova, T V; Yudina, T G; Red'ko, A N; Alekseenko, S N

    2017-03-01

    We modified the protocol of obtaining of biological scaffolds of rat lungs based on dynamic recording of specific resistivity of working detergent solution (conductometry) during perfusion decellularization. Termination of sodium deoxycholate exposure after attaining ionic equilibrium plateau did not impair the quality of decellularization and preserved structural matrix components, which was confirmed by morphological analysis and quantitative assay of residual DNA.

  9. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  10. Improving International-Level Chess Players' Performance with an Acceptance-Based Protocol: Preliminary Findings

    Science.gov (United States)

    Ruiz, Francisco J.; Luciano, Carmen

    2012-01-01

    This study compared an individual, 4-hr intervention based on acceptance and commitment therapy (ACT) versus a no-contact control condition in improving the performance of international-level chess players. Five participants received the brief ACT protocol, with each matched to another chess player with similar characteristics in the control…

  11. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  12. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  13. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    2004-01-01

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  14. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  15. Energy Threshold-based Cluster Head Rotation for Routing Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hadi Raheem Ali

    2018-05-01

    Full Text Available Energy efficiency represents a fundamental issue in WSNs, since the network lifetime period entirely depends on the energy of sensor nodes, which are usually battery-operated. In this article, an unequal clustering-based routing protocol has been suggested, where parameters of energy, distance, and density are involved in the cluster head election. Besides, the sizes of clusters are unequal according to distance, energy, and density. Furthermore, the cluster heads are not changed every round unless the residual energy reaches a specific threshold of energy. The outcomes of the conducted simulation confirmed that the performance of the suggested protocol achieves improvement in energy efficiency.

  16. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  17. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  18. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  19. Uranium enrichment

    International Nuclear Information System (INIS)

    Rae, H.K.; Melvin, J.G.

    1988-06-01

    Canada is the world's largest producer and exporter of uranium, most of which is enriched elsewhere for use as fuel in LWRs. The feasibility of a Canadian uranium-enrichment enterprise is therefore a perennial question. Recent developments in uranium-enrichment technology, and their likely impacts on separative work supply and demand, suggest an opportunity window for Canadian entry into this international market. The Canadian opportunity results from three particular impacts of the new technologies: 1) the bulk of the world's uranium-enrichment capacity is in gaseous diffusion plants which, because of their large requirements for electricity (more than 2000 kW·h per SWU), are vulnerable to competition from the new processes; 2) the decline in enrichment costs increases the economic incentive for the use of slightly-enriched uranium (SEU) fuel in CANDU reactors, thus creating a potential Canadian market; and 3) the new processes allow economic operation on a much smaller scale, which drastically reduces the investment required for market entry and is comparable with the potential Canadian SEU requirement. The opportunity is not open-ended. By the end of the century the enrichment supply industry will have adapted to the new processes and long-term customer/supplier relationships will have been established. In order to seize the opportunity, Canada must become a credible supplier during this century

  20. The Development of Target-Specific Pose Filter Ensembles To Boost Ligand Enrichment for Structure-Based Virtual Screening.

    Science.gov (United States)

    Xia, Jie; Hsieh, Jui-Hua; Hu, Huabin; Wu, Song; Wang, Xiang Simon

    2017-06-26

    Structure-based virtual screening (SBVS) has become an indispensable technique for hit identification at the early stage of drug discovery. However, the accuracy of current scoring functions is not high enough to confer success to every target and thus remains to be improved. Previously, we had developed binary pose filters (PFs) using knowledge derived from the protein-ligand interface of a single X-ray structure of a specific target. This novel approach had been validated as an effective way to improve ligand enrichment. Continuing from it, in the present work we attempted to incorporate knowledge collected from diverse protein-ligand interfaces of multiple crystal structures of the same target to build PF ensembles (PFEs). Toward this end, we first constructed a comprehensive data set to meet the requirements of ensemble modeling and validation. This set contains 10 diverse targets, 118 well-prepared X-ray structures of protein-ligand complexes, and large benchmarking actives/decoys sets. Notably, we designed a unique workflow of two-layer classifiers based on the concept of ensemble learning and applied it to the construction of PFEs for all of the targets. Through extensive benchmarking studies, we demonstrated that (1) coupling PFE with Chemgauss4 significantly improves the early enrichment of Chemgauss4 itself and (2) PFEs show greater consistency in boosting early enrichment and larger overall enrichment than our prior PFs. In addition, we analyzed the pairwise topological similarities among cognate ligands used to construct PFEs and found that it is the higher chemical diversity of the cognate ligands that leads to the improved performance of PFEs. Taken together, the results so far prove that the incorporation of knowledge from diverse protein-ligand interfaces by ensemble modeling is able to enhance the screening competence of SBVS scoring functions.

  1. L-Lactate-selective microbial sensor based on flavocytochrome b2-enriched yeast cells using recombinant and nanotechnology approaches.

    Science.gov (United States)

    Karkovska, Maria; Smutok, Oleh; Stasyuk, Nataliya; Gonchar, Mykhailo

    2015-11-01

    In the recent years, nanotechnology is the most developing branch due to a wide variety of potential applications in biomedical, biotechnological and agriculture fields. The binding nanoparticles with various biological molecules makes them attractive candidates for using in sensor technologies. The particularly actual is obtaining the bionanomembranes based on biocatalytic elements with improved sensing characteristics. The aim of this investigation is to study the properties of microbial L-lactate-selective sensor based on using the recombinant Hansenula polymorpha yeast cells overproducing flavocytochrome b2 (FC b2), as well as additionally enriched by the enzyme bound with gold nanoparticles (FC b2-nAu). Although, the high permeability of the living cells to nanoparticles is being intensively studied (mostly for delivery of drugs), the idea of using both recombinant technology and nanotechnology to increase the amount of the target enzyme in the biosensing layer is really novel. The FC b2-nAu-enriched living and permeabilized yeast cells were used for construction of a bioselective membrane of microbial L-lactate-selective amperometric biosensor. Phenazine methosulphate was served as a free defusing electron transfer mediator which provides effective electron transfer from the reduced enzyme to the electrode surface. It was shown that the output to L-lactate of FC b2-nAu-enriched permeabilized yeast cells is 2.5-fold higher when compared to the control cells. The obtained results confirm that additional enrichment of the recombinant yeast cell by the enzyme bound with nanoparticles improves the analytical parameters of microbial sensor. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. A novel porcine cell culture based protocol for the propagation of hepatitis E virus

    Directory of Open Access Journals (Sweden)

    Walter Chingwaru

    2016-08-01

    Full Text Available Objective: To present a comprehensive protocol for the processing of hepatitis E virus (HEV infected samples and propagation of the virus in primary cell cultures. Methods: Hepatitis E was extracted from porcine liver and faecal samples following standard protocols. The virus was then allowed to attach in the presence of trypsin to primary cells that included porcine and bovine intestinal epithelial cells and macrophages over a period of up to 3 h. The virus was propagated by rotational passaging through the cell cultures. Propagation was confirmed by immunoblotting. Results: We developed a comprehensive protocol to propagate HEV in porcine cell model that includes (i rotational culturing of the virus between porcine cell types, (ii pre-incubation of infected cells for 210 min, (iii use of a semi-complete cell culture medium supplemented with trypsin (0.33 µg/mL and (iv the use of simple immunoblot technique to detect the amplified virus based on the open reading frame 2/3. Conclusions: This protocol opens doors towards systematic analysis of the mechanisms that underlie the pathogenesis of HEV in vitro. Using our protocol, one can complete the propagation process within 6 to 9 d.

  3. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  4. Uranium enrichment

    International Nuclear Information System (INIS)

    Mohrhauer, H.

    1982-01-01

    The separation of uranium isotopes in order to enrich the fuel for light water reactors with the light isotope U-235 is an important part of the nuclear fuel cycle. After the basic principals of isotope separation the gaseous diffusion and the centrifuge process are explained. Both these techniques are employed on an industrial scale. In addition a short review is given on other enrichment techniques which have been demonstrated at least on a laboratory scale. After some remarks on the present situation on the enrichment market the progress in the development and the industrial exploitation of the gas centrifuge process by the trinational Urenco-Centec organisation is presented. (orig.)

  5. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    Science.gov (United States)

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  6. Preoperative magnetic resonance imaging protocol for endoscopic cranial base image-guided surgery.

    Science.gov (United States)

    Grindle, Christopher R; Curry, Joseph M; Kang, Melissa D; Evans, James J; Rosen, Marc R

    2011-01-01

    Despite the increasing utilization of image-guided surgery, no radiology protocols for obtaining magnetic resonance (MR) imaging of adequate quality are available in the current literature. At our institution, more than 300 endonasal cranial base procedures including pituitary, extended pituitary, and other anterior skullbase procedures have been performed in the past 3 years. To facilitate and optimize preoperative evaluation and assessment, there was a need to develop a magnetic resonance protocol. Retrospective Technical Assessment was performed. Through a collaborative effort between the otolaryngology, neurosurgery, and neuroradiology departments at our institution, a skull base MR image-guided (IGS) protocol was developed with several ends in mind. First, it was necessary to generate diagnostic images useful for the more frequently seen pathologies to improve work flow and limit the expense and inefficiency of case specific MR studies. Second, it was necessary to generate sequences useful for IGS, preferably using sequences that best highlight that lesion. Currently, at our institution, all MR images used for IGS are obtained using this protocol as part of preoperative planning. The protocol that has been developed allows for thin cut precontrast and postcontrast axial cuts that can be used to plan intraoperative image guidance. It also obtains a thin cut T2 axial series that can be compiled separately for intraoperative imaging, or may be fused with computed tomographic images for combined modality. The outlined protocol obtains image sequences effective for diagnostic and operative purposes for image-guided surgery using both T1 and T2 sequences. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  8. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  9. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  10. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  11. A hybrid monolithic column based on boronate-functionalized graphene oxide nanosheets for online specific enrichment of glycoproteins.

    Science.gov (United States)

    Zhou, Chanyuan; Chen, Xiaoman; Du, Zhuo; Li, Gongke; Xiao, Xiaohua; Cai, Zongwei

    2017-05-19

    A hybrid monolithic column based on aminophenylboronic acid (APBA)-functionalized graphene oxide (GO) has been developed and used for selective enrichment of glycoproteins. The APBA/GO composites were homogeneously incorporated into a polymer monolithic column with the help of oligomer matrix and followed by in situ polymerization. The effect of dispersion of APBA/GO composites in the polymerization mixture on the performance of the monolithic column was explored in detail. The presence of graphene oxide not only enlarged the BET surface area from 6.3m 2 /g to 169.4m 2 /g, but also provided abundant boronic acid moieties for glycoprotein extraction, which improved the enrichment selectivity and efficiency for glycoproteins. The APBA/GO hybrid monolithic column was incorporated into a sequential injection system, which facilitated online extraction of proteins. Combining the superior properties of extraordinary surface area of GO and the affinity interaction of APBA to glycoproteins, the APBA/GO hybrid monolithic column showed higher enrichment factors for glycoproteins than other proteins without cis-diol-containing groups. Also, under comparable or even shorter processing time and without the addition of any organic solvent, it showed higher binding capacity toward glycoproteins compared with the conventional boronate affinity monolithic column. The practical applicability of this system was demonstrated by processing of egg white samples for extraction of ovalbumin and ovotransferrin, and satisfactory results were obtained by assay with SDS-PAGE. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Enrichment of steroid hormones in water with porous and hydrophobic polymer-based SPE followed by HPLC-UV determination.

    Science.gov (United States)

    Hu, Yinfen; Zhang, Man; Tong, Changlun; Wu, Jianmin; Liu, Weiping

    2013-10-01

    There have been great concerns about the persistence of steroid hormones in surface water. Since the concentrations of these compounds in water samples are usually at a trace level, the efficient enrichment of steroid hormones is vital for further analysis. In this work, a porous and hydrophobic polymer was synthesized and characterized. The composition of solvent used as porogen in the synthetic process was shown to have an effect on the morphology of the polymer, which was successfully used as an SPE sorbent for simultaneously enriching steroid hormones in surface water samples. The recoveries of the steroid hormones on the custom-made polymer ranged from 93.4 to 106.2%, whereas those on commercialized ENVI-18, LC-18, and Oasis HLB ranged from 54.8 to 104.9, 66 to 93.6, and 77.2 to 106%, respectively. Five types of steroid hormones were simultaneously measured using HPLC-UV after they were enriched by the custom-made sorbent. Based on these findings, the SPE-HPLC method was developed. The LODs of this method for estriol, estradiol, estrone, androstenedione, progesterone were 0.07, 0.43, 0.61, 0.27, and 0.42 μg/L, respectively, while precision and reproducibility RSDs were <6.40 and 7.49%, respectively. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  14. Language pathway tracking: comparing nTMS-based DTI fiber tracking with a cubic ROIs-based protocol.

    Science.gov (United States)

    Negwer, Chiara; Sollmann, Nico; Ille, Sebastian; Hauck, Theresa; Maurer, Stefanie; Kirschke, Jan S; Ringel, Florian; Meyer, Bernhard; Krieg, Sandro M

    2017-03-01

    OBJECTIVE Diffusion tensor imaging (DTI) fiber tracking (FT) has been widely used in glioma surgery in recent years. It can provide helpful information about subcortical structures, especially in patients with eloquent space-occupying lesions. This study compared the newly developed navigated transcranial magnetic stimulation (nTMS)-based DTI FT of language pathways with the most reproducible protocol for language pathway tractography, using cubic regions of interest (ROIs) for the arcuate fascicle. METHODS Thirty-seven patients with left-sided perisylvian lesions underwent language mapping by repetitive nTMS. DTI FT was performed using the cubic ROIs-based protocol and the authors' nTMS-based DTI FT approach. The same minimal fiber length and fractional anisotropy were chosen (50 mm and 0.2, respectively). Both protocols were performed with standard clinical tractography software. RESULTS Both methods visualized language-related fiber tracts (i.e., corticonuclear tract, arcuate fascicle, uncinate fascicle, superior longitudinal fascicle, inferior longitudinal fascicle, arcuate fibers, commissural fibers, corticothalamic fibers, and frontooccipital fascicle) in all 37 patients. Using the cubic ROIs-based protocol, 39.9% of these language-related fiber tracts were detected in the examined patients, as opposed to 76.0% when performing nTMS-based DTI FT. For specifically tracking the arcuate fascicle, however, the cubic ROIs-based approach showed better results (97.3% vs 75.7% with nTMS-based DTI FT). CONCLUSIONS The cubic ROIs-based protocol was designed for arcuate fascicle tractography, and this study shows that it is still useful for this intention. However, superior results were obtained using the nTMS-based DTI FT for visualization of other language-related fiber tracts.

  15. The protocols for the 10/66 dementia research group population-based research programme

    OpenAIRE

    Salas Aquiles; Rodriguez Juan; McKeigue Paul; Jacob KS; Krishnamoorthy ES; Huang Yueqin; Guerra Mariella; Gavrilova Svetlana I; Dewey Michael; Arizaga Raul; Albanese Emiliano; Acosta Daisy; Ferri Cleusa P; Prince Martin; Sosa Ana

    2007-01-01

    Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Meth...

  16. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  17. Antioxidant potential and quality characteristics of vegetable-enriched corn-based extruded snacks.

    Science.gov (United States)

    Bisharat, G I; Lazou, A E; Panagiotou, N M; Krokida, M K; Maroulis, Z B

    2015-07-01

    Phenolic content, antioxidant activity and sensory characteristics of vegetable-enriched extrudates were investigated as a result of extrusion conditions, including extrusion temperature (140-180 °C), screw rotation speed (150-250 rpm) and feed moisture content (14-19 % w.b.). Broccoli flour and olive paste was used in mixtures with corn flour at a ratio of 4 to 10 % (broccoli/corn) and 4 to 8 % (olive paste/corn). A simple power model was developed for the prediction of phenolic content and antioxidant activity of extrudates by extrusion conditions and feed composition. Phenolic content and antioxidant activity of broccoli enriched extrudates increased with extrusion temperature and broccoli addition and decreased with feed moisture content. The antioxidant activity of olive paste extrudates increased with material ratio and decreased with feed moisture content and screw rotation. Sensory porosity, homogenous structure, crispness, cohesiveness and melting decreased with feed moisture content, while the latter increased the mealy flavor and hardness of extrudates. Acceptable snacks containing broccoli flour or olive paste can be produced by selecting the appropriate process conditions.

  18. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  19. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  20. Efficacy of protocol-based pharmacotherapy management on anticoagulation with warfarin for patients with cardiovascular surgery.

    Science.gov (United States)

    Katada, Y; Nakagawa, S; Minakata, K; Odaka, M; Taue, H; Sato, Y; Yonezawa, A; Kayano, Y; Yano, I; Nakatsu, T; Sakamoto, K; Uehara, K; Sakaguchi, H; Yamazaki, K; Minatoya, K; Sakata, R; Matsubara, K

    2017-10-01

    Anticoagulation therapy with warfarin requires periodic monitoring of prothrombin time-international normalized ratio (PT-INR) and adequate dose adjustments based on the data to minimize the risk of bleeding and thromboembolic events. In our hospital, we have developed protocol-based pharmaceutical care, which we called protocol-based pharmacotherapy management (PBPM), for warfarin therapy. The protocol requires pharmacists to manage timing of blood sampling for measuring PT-INR and warfarin dosage determination based on an algorithm. This study evaluated the efficacy of PBPM in warfarin therapy by comparing to conventional pharmaceutical care. From October 2013 to June 2015, a total of 134 hospitalized patients who underwent cardiovascular surgeries received post-operative warfarin therapy. The early series of patients received warfarin therapy as the conventional care (control group, n=77), whereas the latter received warfarin therapy based on the PBPM (PBPM group, n=68). These patients formed the cohort of the present study and were retrospectively analysed. The indications for warfarin included aortic valve replacement (n=56), mitral valve replacement (n=4), mitral valve plasty (n=22) and atrial fibrillation (n=29). There were no differences in patients' characteristics between both groups. The percentage time in therapeutic range in the first 10 days was significantly higher in the PBPM group (47.1%) than that in the control group (34.4%, PWarfarin therapy based on our novel PBPM was clinically safe and resulted in significantly better anticoagulation control compared to conventional care. © 2017 John Wiley & Sons Ltd.

  1. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  2. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  3. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  4. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Directory of Open Access Journals (Sweden)

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  5. Effects of 2 Types of Activation Protocols Based on Postactivation Potentiation on 50-m Freestyle Performance.

    Science.gov (United States)

    Cuenca-Fernández, Francisco; Ruiz-Teba, Ana; López-Contreras, Gracia; Arellano, Raúl

    2018-06-14

    Cuenca-Fernández, F, Ruiz-Teba, A, López-Contreras, G, and Arellano, R. Effects of 2 types of activation protocols based on postactivation potentiation on 50-m freestyle performance. J Strength Cond Res XX(X): 000-000, 2018-Postactivation potentiation (PAP) is a phenomenon which improves muscle contractility, strength, and speed in sporting performances through previously applied maximal or submaximal loads on the muscle system. This study aimed to assess the effects of 2 types of activation protocols based on PAP, on sprint swimming performance. A repeated-measures design was used to compare 3 different scenarios before a 50-m race. First, all of the participants performed a standard warm-up (SWU), consisting of a 400-m swim followed by dynamic stretching. This protocol acted as the control. Subsequently, the swimmers were randomly assigned into 2 groups: the swimmers in the first group performed the SWU followed by a PAP one-repetition maximum warm-up (RMWU), consisting of 3 "lunge" and 3 "arm stroke" repetitions, both at 85% of the one-repetition maximum. The swimmers in the second group performed the SWU followed by a PAP eccentric flywheel warm-up (EWU), consisting of one set of 4 repetitions of exercises of both the lower and upper limbs on an adapted eccentric flywheel at the maximal voluntary contraction. The time required for the swimmers to swim 5 and 10 m was shorter with the PAP protocols. The swimming velocity of the swimmers who underwent the EWU and RMWU protocols was faster at 5 and 10 m. The best total swimming time was not influenced by any of the protocols. When isolating swimming (excluding start performance and turn), best time was achieved with the SWU and RMWU compared with EWU (SWU: 20.86 ± 0.95 seconds; EWU: 21.25 ± 1.12 seconds; RMWU: 20.97 ± 1.22 seconds). In conclusion, a warm-up based on PAP protocols might exert an influence on performance in the first meters of a 50-m race. Nevertheless, other factors, such as fatigue, could

  6. Effects of citrate-enriched bicarbonate based dialysate on anticoagulation and dialyzer reuse in maintenance hemodialysis patients.

    Science.gov (United States)

    Rocha, Amanda D; Padua, Vanessa C; Oliveira, Esther; Guimaraes, Márcia M; Lugon, Jocemir R; Strogoff de Matos, Jorge P

    2014-04-01

    Systemic anticoagulation with unfractionated heparin is commonly used in maintenance hemodialysis (HD), but it increases the risk of bleeding complications. We investigated whether the use of citrate-enriched bicarbonate based dialysate (CD) would reduce systemic anticoagulation without compromising the efficacy of reprocessed dialyzers. This is a crossover study in which half of a total of 30 patients initially underwent HD with acetate-enriched bicarbonate based dialysate and a standard heparin dose of ∼ 100 IU/kg (Treatment A), whereas the remaining patients were treated with CD and a 30% reduced heparin dose (Treatment B). After 12 consecutive HD sessions in each treatment, the dialysate and heparin doses were reversed, then followed for another period of 12 HD sessions. The two treatment phases were split by a washout period of six HD sessions using acetate-enriched bicarbonate based dialysate and standard heparin dose. Systemic anticoagulation was higher in Treatment A. The activated partial thromboplastin time at the end of HD session was 68 ± 36 seconds in Treatment A and 47 ± 16 seconds in Treatment B (P = 0.005). Sixty-eight percent of the dialyzers remained adequate until the 12th use in Treatment A and 61% did so in Treatment B (P = 0.63). Patients had three and 24 cramps episodes during Treatment A and B, respectively (P < 0.001). Nine and 26 symptomatic intradialytic hypotension episodes were seen in Treatment A and B, respectively, (P = 0.003). In conclusion, the use of CD had a favorable effect on anticoagulation in the extracorporeal circuit in patients on maintenance HD, but it was also associated with more hypotension and cramps. © 2013 International Society for Hemodialysis.

  7. Evaluation of a RF-Based Approach for Tracking UF6 Cylinders at a Uranium Enrichment Plant

    International Nuclear Information System (INIS)

    Pickett, Chris A; Younkin, James R; Kovacic, Donald N; Laughter, Mark D; Hines, Jairus B; Boyer, Brian Martinez

    2008-01-01

    Approved industry-standard cylinders are used globally to handle and store uranium hexafluoride (UF 6 ) feed, product, tails, and samples at uranium enrichment plants. The International Atomic Energy Agency (IAEA) relies on time-consuming physical inspections to verify operator declarations and detect possible diversion of UF 6 . Development of a reliable, automated, and tamper-resistant system for near real-time tracking and monitoring UF 6 cylinders (as they move within an enrichment facility) would greatly improve the inspector function. This type of system can reduce the risk of false or misreported cylinder tare weights, diversion of nuclear material, concealment of excess production, utilization of undeclared cylinders, and misrepresentation of the cylinders contents. This paper will describe a proof-of-concept approach that was designed to evaluate the feasibility of using radio frequency (RF)-based technologies to track individual UF 6 cylinders throughout a portion of their life cycle, and thus demonstrate the potential for improved domestic accountability of materials, and a more effective and efficient method for application of site-level IAEA safeguards. The evaluation system incorporates RF-based identification devices (RFID) which provide a foundation for establishing a reliable, automated, and near real-time tracking system that can be set up to utilize site-specific, rules-based detection algorithms. This paper will report results from a proof-of-concept demonstration at a real enrichment facility that is specifically designed to evaluate both the feasibility of using RF to track cylinders and the durability of the RF equipment to survive the rigors of operational processing and handling. The paper also discusses methods for securely attaching RF devices and describes how the technology can effectively be layered with other safeguard systems and approaches to build a robust system for detecting cylinder diversion. Additionally, concepts for off

  8. Radioactive Waste Issues related to Production of Fission-based Mo-99 by using Low Enriched Uranium (LEU)

    Energy Technology Data Exchange (ETDEWEB)

    Hassan, Muhmood ul; Ryu, Ho Jin [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2014-10-15

    In order to produce fission-based Mo-99 from research reactors, two types of targets are being used and they are highly enriched uranium (HEU) targets with {sup 235}U enrichment more than 90wt% of {sup 235}U and low enriched uranium (LEU) targets with {sup 235}U enrichment less than 20wt% of {sup 235}U. It is worth noting that medium enriched uranium i.e. 36wt% of {sup 235}U as being used in South Africa is also regarded as non-LEU from a nuclear security point of view. In order to cope with the proliferation issues, international nuclear security policy is promoting the use of LEU targets in order to minimize the civilian use of HEU. It is noteworthy that Mo-99 yield of the LEU target is less than 20% of the HEU target, which requires approximately five times more LEU targets to be irradiated and consequently results in increased volume of waste. The waste generated from fission Mo-99 production can be mainly due to: target fabrication, assembling of target, irradiation in reactor and processing of irradiated targets. During the fission of U-235 in a reactor, a large number of radionuclides with different chemical and physical properties are formed. The waste produced from these practices may be a combination of low level waste (LLW) and intermediate level waste (ILW) comprised of all three types, i.e., solid, liquid and gas. Handling and treatment of the generated waste are dependent on its form and activity. In case of the large production facility, waste storage facility should be constructed in order to limit the radiation exposures of the workers and the environment. In this study, we discuss and compare mainly the radioactive waste generated by alkaline digestion of both HEU and LEU targets to assist in planning and deciding the choice of the technology with better arrangements for proper handling and disposal of generated waste. With the use of the LEU targets in Mo-99 production facility, significant increase in liquid and solid waste has been expected.

  9. Size-exclusion chromatography-based enrichment of extracellular vesicles from urine samples

    Directory of Open Access Journals (Sweden)

    Inés Lozano-Ramos

    2015-05-01

    Full Text Available Renal biopsy is the gold-standard procedure to diagnose most of renal pathologies. However, this invasive method is of limited repeatability and often describes an irreversible renal damage. Urine is an easily accessible fluid and urinary extracellular vesicles (EVs may be ideal to describe new biomarkers associated with renal pathologies. Several methods to enrich EVs have been described. Most of them contain a mixture of proteins, lipoproteins and cell debris that may be masking relevant biomarkers. Here, we evaluated size-exclusion chromatography (SEC as a suitable method to isolate urinary EVs. Following a conventional centrifugation to eliminate cell debris and apoptotic bodies, urine samples were concentrated using ultrafiltration and loaded on a SEC column. Collected fractions were analysed by protein content and flow cytometry to determine the presence of tetraspanin markers (CD63 and CD9. The highest tetraspanin content was routinely detected in fractions well before the bulk of proteins eluted. These tetraspanin-peak fractions were analysed by cryo-electron microscopy (cryo-EM and nanoparticle tracking analysis revealing the presence of EVs.When analysed by sodium dodecyl sulphate–polyacrylamide gel electrophoresis, tetraspanin-peak fractions from urine concentrated samples contained multiple bands but the main urine proteins (such as Tamm–Horsfall protein were absent. Furthermore, a preliminary proteomic study of these fractions revealed the presence of EV-related proteins, suggesting their enrichment in concentrated samples. In addition, RNA profiling also showed the presence of vesicular small RNA species.To summarize, our results demonstrated that concentrated urine followed by SEC is a suitable option to isolate EVs with low presence of soluble contaminants. This methodology could permit more accurate analyses of EV-related biomarkers when further characterized by -omics technologies compared with other approaches.

  10. Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System

    Directory of Open Access Journals (Sweden)

    Abhishek Joshi

    2017-01-01

    Full Text Available Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D topology. Various emerging application areas such as airborne networks and underwater wireless sensor networks are usually deployed using three-dimensional (3D network topology. In this paper, a static 3D cluster-based network topology has been proposed for airborne networks. A network protocol stack consisting of various protocols such as TDMA MAC and dynamic routing along with services such as time synchronization, Cluster Head rotation, and power level management has been proposed for this airborne network. The proposed protocol stack has been implemented on the hardware platform consisting of number of TelosB nodes. This 3D airborne network architecture can be used to measure Air Quality Index (AQI in an area. Various parameters of network such as energy consumption, Cluster Head rotation, time synchronization, and Packet Delivery Ratio (PDR have been analyzed. Detailed description of the implementation of the protocol stack along with results of implementation has been provided in this paper.

  11. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  12. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  13. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  14. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  15. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  16. Bioremediation of oil sludge contaminated soil using bulking agent mixture enriched consortia of microbial inoculants based by irradiated compost

    International Nuclear Information System (INIS)

    Tri Retno, D.L.; Mulyana, N.

    2013-01-01

    Bulking agent mixture enriched consortia of microbial inoculants based by irradiated compost was used on bioremediation of microcosm scale contaminated by hydrocarbon soil. Bioremediation composting was carried out for 42 days. Composting was done with a mixture of bulking agent (sawdust, residual sludge biogas and compost) by 30%, mud petroleum (oil sludge) by 20% and 50% of soil. Mixture of 80% soil and 20% oil sludge was used as a control. Irradiated compost was used as a carrier for consortia of microbial inoculants (F + B) which biodegradable hydrocarbons. Treatment variations include A1, A2, B1, B2, C1, C2, D1 and D2. Process parameters were observed to determine the optimal conditions include: temperature, pH, water content, TPC (Total Plate Count) and degradation of % TPH (Total Petroleum Hydrocarbon). Optimal conditions were achieved in the remediation of oil sludge contamination of 20% using the B2 treatment with the addition consortia of microbial inoculants based by irradiated compost of sawdust (bulking agentby 30% at concentrations of soil by 50% with TPH degradation optimal efficiency of 81.32%. The result of GC-MS analysis showed that bioremediation for 42 days by using a sawdust as a mixture of bulking agents which enriched consortia of microbial inoculants based by irradiated compost is biodegradeable, so initial hydrocarbons with the distribution of the carbon chain C-7 to C-54 into final hydrocarbons with the distribution of carbon chain C-6 to C-8. (author)

  17. Isotope enrichment

    International Nuclear Information System (INIS)

    Garbuny, M.

    1979-01-01

    The invention discloses a method for deriving, from a starting material including an element having a plurality of isotopes, derived material enriched in one isotope of the element. The starting material is deposited on a substrate at less than a critical submonatomic surface density, typically less than 10 16 atoms per square centimeter. The deposit is then selectively irradiated by a laser (maser or electronic oscillator) beam with monochromatic coherent radiation resonant with the one isotope causing the material including the one istope to escape from the substrate. The escaping enriched material is then collected. Where the element has two isotopes, one of which is to be collected, the deposit may be irradiated with radiation resonant with the other isotope and the residual material enriched in the one isotope may be evaporated from the substrate and collected

  18. Prediction based Greedy Perimeter Stateless Routing Protocol for Vehicular Self-organizing Network

    Science.gov (United States)

    Wang, Chunlin; Fan, Quanrun; Chen, Xiaolin; Xu, Wanjin

    2018-03-01

    PGPSR (Prediction based Greedy Perimeter Stateless Routing) is based on and extended the GPSR protocol to adapt to the high speed mobility of the vehicle auto organization network (VANET) and the changes in the network topology. GPSR is used in the VANET network environment, the network loss rate and throughput are not ideal, even cannot work. Aiming at the problems of the GPSR, the proposed PGPSR routing protocol, it redefines the hello and query packet structure, in the structure of the new node speed and direction information, which received the next update before you can take advantage of its speed and direction to predict the position of node and new network topology, select the right the next hop routing and path. Secondly, the update of the outdated node information of the neighbor’s table is deleted in time. The simulation experiment shows the performance of PGPSR is better than that of GPSR.

  19. A survey on bio inspired meta heuristic based clustering protocols for wireless sensor networks

    Science.gov (United States)

    Datta, A.; Nandakumar, S.

    2017-11-01

    Recent studies have shown that utilizing a mobile sink to harvest and carry data from a Wireless Sensor Network (WSN) can improve network operational efficiency as well as maintain uniform energy consumption by the sensor nodes in the network. Due to Sink mobility, the path between two sensor nodes continuously changes and this has a profound effect on the operational longevity of the network and a need arises for a protocol which utilizes minimal resources in maintaining routes between the mobile sink and the sensor nodes. Swarm Intelligence based techniques inspired by the foraging behavior of ants, termites and honey bees can be artificially simulated and utilized to solve real wireless network problems. The author presents a brief survey on various bio inspired swarm intelligence based protocols used in routing data in wireless sensor networks while outlining their general principle and operation.

  20. Evaluation of different enrichment methods for pathogenic Yersinia species detection by real time PCR

    Science.gov (United States)

    2014-01-01

    Background Yersiniosis is a zoonotic disease reported worldwide. Culture and PCR based protocols are the most common used methods for detection of pathogenic Yersinia species in animal samples. PCR sensitivity could be increased by an initial enrichment step. This step is particularly useful in surveillance programs, where PCR is applied to samples from asymptomatic animals. The aim of this study was to evaluate the improvement in pathogenic Yersinia species detection using a suitable enrichment method prior to the real time PCR (rtPCR). Nine different enrichment protocols were evaluated including six different broth mediums (CASO, ITC, PSB, PBS, PBSMSB and PBSSSB). Results The analysis of variance showed significant differences in Yersinia detection by rtPCR according to the enrichment protocol used. These differences were higher for Y. pseudotuberculosis than for Y. enterocolitica. In general, samples incubated at lower temperatures yielded the highest detection rates. The best results were obtained with PBSMSB and PBS2. Application of PBSMSB protocol to free-ranging wild board samples improved the detection of Y. enterocolitica by 21.2% when compared with direct rtPCR. Y. pseudotuberculosis detection was improved by 10.6% when results obtained by direct rtPCR and by PBSMSB enrichment before rtPCR were analyzed in combination. Conclusions The data obtained in the present study indicate a difference in Yersinia detection by rtPCR related to the enrichment protocol used, being PBSMSB enrichment during 15 days at 4°C and PBS during 7 days at 4°C the most efficient. The use of direct rtPCR in combination with PBSMSB enrichment prior to rtPCR resulted in an improvement in the detection rates of pathogenic Yersinia in wild boar and could be useful for application in other animal samples. PMID:25168886

  1. Total synthesis of Ivorenolide A following a base-induced elimination protocol.

    Science.gov (United States)

    Mohapatra, Debendra K; Umamaheshwar, Gonela; Rao, R Nageshwar; Rao, T Srinivasa; R, Sudheer Kumar; Yadav, Jhillu S

    2015-02-20

    A concise and stereocontrolled first total synthesis of Ivorenolide A (1) is reported in 16 longest linear steps with a 13.4% overall yield starting from (+)-diethyl tartrate (DET). Key features are base-induced elimination protocol for the construction of chiral propargyl alcohols in both fragments, Pd-catalyzed cross-coupling of terminal acetylenes, and Shiina's 2-methyl-6-nitrobezoic anhydride (MNBA) mediated macrolactonization.

  2. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  3. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  4. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Juan J. Pérez-Solano

    2017-07-01

    Full Text Available Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  5. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.

    Science.gov (United States)

    Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago

    2017-07-06

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  6. Determination of Greenhouse Gases Base Year for Hrvatska elektroprivreda (HEP) in Accordance with Kyoto Protocol

    International Nuclear Information System (INIS)

    Jelavic, V.; Sestic, M.; Juric, Z.; Stanic, Z.

    1998-01-01

    The Kyoto Protocol obliges the Republic of Croatia to reduce greenhouse gas emissions by 5 percent till the year 2010, taking a base year from the period between 1985 and 1990. Thermal power plants of Hrvatska Elektroprivreda (HEP) represent significant source of the most important greenhouse gas - CO 2 - and consequently HEP is expected to make a significant contribution to the national activities aiming to meet the Kyoto Protocol requirements. This issue is of particular importance, as Croatia has not submitted its base year to the Conference of the Parties in form of The National Communication on Climate Change, which is one of the requirements of UN Climate Change Convention and the Kyoto Protocol. Related to this, it is interesting to include emissions from the thermal power plants located in Bosnia and Herzegovina and Serbia (650 MWe) that had supplied electricity to the Croatian power supply system in the base year period and on which HEP claims legal ownership. This article presents HEP greenhouse gas emissions from the period of 1985 to 1990, as well as its contribution in total greenhouse gas emissions of Croatia. Furthermore, future HEP greenhouse gas emissions, according to its business development scenario till the year 2010, will be estimated. (author)

  7. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  8. Annotation-based enrichment of Digital Objects using open-source frameworks

    Directory of Open Access Journals (Sweden)

    Marcus Emmanuel Barnes

    2017-07-01

    Full Text Available The W3C Web Annotation Data Model, Protocol, and Vocabulary unify approaches to annotations across the web, enabling their aggregation, discovery and persistence over time. In addition, new javascript libraries provide the ability for users to annotate multi-format content. In this paper, we describe how we have leveraged these developments to provide annotation features alongside Islandora’s existing preservation, access, and management capabilities. We also discuss our experience developing with the Web Annotation Model as an open web architecture standard, as well as our approach to integrating mature external annotation libraries. The resulting software (the Web Annotation Utility Module for Islandora accommodates annotation across multiple formats. This solution can be used in various digital scholarship contexts.

  9. Exercise-based cardiac rehabilitation for adults after Heart valve surgery (protocol)

    DEFF Research Database (Denmark)

    Lærum Sibilitz, Kristine; Berg, Selina Kikkenborg; Tang, Lars Hermann

    2013-01-01

    This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the benefits and harms of exercise-based intervention programmes (exercise-based interventions alone or in combination with psycho-educational components), compared to no intervention, or treatment...... as usual, in adults who have had heart valve surgery. In this review we will focus on programmes that include an exercise-based intervention with, or without, another rehabilitation component (such as a psycho-educational component)....

  10. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qian Xiao

    2012-09-01

    Full Text Available To provide security for data gathering based on network coding in wireless sensor networks (WSNs, a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPPaamp;PP protocol using network coding is designed. DPPaamp;PP makes use of a new proposed pollution symbol selection and pollution (PSSP scheme based on a new obfuscation idea to pollute existing symbols. Analyses of DPPaamp;PP show that it not only requires low overhead on computation and communication, but also provides high security on resisting brute-force attacks.

  11. Where Words Fail, Music Speaks: A Mixed Method Study of an Evidence-Based Music Protocol.

    Science.gov (United States)

    Daniels, Ruby A; Torres, David; Reeser, Cathy

    2016-01-01

    Despite numerous studies documenting the benefits of music, hospice social workers are often unfamiliar with evidence-based music practices that may improve end of life care. This mixed method study tested an intervention to teach hospice social workers and chaplains (N = 10) an evidence-based music protocol. Participants used the evidence-based practice (EBP) for 30 days, recording 226 journal entries that described observations of 84 patients and their families. There was a significant increase in EBP knowledge (35%). Prompting behavioral and emotional responses, music was described frequently as a catalyst that facilitated deeper dialogue between patients, families, social workers, and chaplains.

  12. BIOTECHNOLOGY AS A USEFUL TOOL FOR NUTRITIONAL IMPROVEMENT OF CEREAL-BASED MATERIALS ENRICHED WITH POLYUNSATURATED FATTY ACIDS AND PIGMENTS

    Directory of Open Access Journals (Sweden)

    M. Čertík

    2008-09-01

    Full Text Available Cereals represent a major food supply for humanity. Although these sources are rich in proteins and carbohydrates, many of them are deficient in several essential nutrients, such as polyunsaturated fatty acids (PUFAs and carotenoid pigments. One possible approach how to enhance the content of PUFAs or carotenoids in cereal diet is based on biotechnological transformation of cereal materials by solid state fermentations. This technique is powerful tool for effective valorisation of these resources to various types of value-added bioproducts with demanded properties and functions. Selected filamentous Mucorales fungi were applied for conversion of numerous agroindustrial substrates to bioproducts enriched with PUFAs, such as gamma-linolenic acid (GLA, dihomo-gamma-linolenic acid (DGLA, arachidonic acid (AA and eicosapentaenoic acid (EPA. On the other hand, a range of yeast species utilizing agroindustrial substrates were employed for formation of carotenoids, such as β-carotene, torulene, torularhodine and astaxanthin. Such naturally prepared cereal based bioproducts enriched with either PUFAs or carotenoid pigments may be used as an inexpensive food and feed supplement. The work was supported by grant VEGA No. 1/0747/08 from the Grant Agency of Ministry of Education, Slovak Republic.

  13. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  14. Missed Cases in the Detection of Child Abuse Based on Parental Characteristics in the Emergency Department (the Hague Protocol)

    NARCIS (Netherlands)

    Diderich, H.M.; Verkerk, P.H.; Oudesluys-Murphy, A.M.; Dechesne, M.; Buitendijk, S.E.; Fekkes, M.

    2015-01-01

    Introduction We aimed to assess the number of “missed cases” in the detection of child abuse based on the Hague Protocol. This protocol considers 3 parental characteristics of ED adult patients to identify child abuse: (1) domestic violence, (2) intoxication, and (3) suicide attempt or

  15. On printability, quality and nutritional properties of 3D printed cereal based snacks enriched with edible insects.

    Science.gov (United States)

    Severini, C; Azzollini, D; Albenzio, M; Derossi, A

    2018-04-01

    3D printing technology was employed to obtain snacks with a designed cylindrical geometry from wheat flour dough enriched by ground larvae of Yellow mealworms (Tenebrio molitor) as novel source of proteins. The main microstructural features, overall quality, and nutritional attributes were studied as a function of formulation, time and temperature of baking. The addition of ground insects up to 20 g/100 g (d.b.) resulted in softer dough. This caused an overflow in dough deposition producing the increase in diameter, height and weight of snacks. Baking conditions did not alter the overall aspect of the snacks, but modification of the main dimensional and microstructure attributes were observed due to the better water evaporation. The optimization of baking conditions found that 22 min and 200 °C allowed obtaining a maximum desirability of 0.693. Baked in these conditions, the printed snacks enriched with 10 and 20% of ground insects significantly increased the total essential amino acid, from 32.5 (0% insects) to 38.2 and 41.3 g/100 g protein, respectively. The protein digestibility corrected amino acid score increased from 41.6 to 65.2 from 0 to 20% insect enrichment, with lysine and methionine + cysteine being the respective limiting amino acid. Our results evidenced the rational promotion of insects based on nutritional arguments and validated the use of 3D printing as technology to manufacture innovative printed snacks without adverse impact on technological quality. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Edge-enriched, porous carbon-based, high energy density supercapacitors for hybrid electric vehicles.

    Science.gov (United States)

    Kim, Yong Jung; Yang, Cheol-Min; Park, Ki Chul; Kaneko, Katsumi; Kim, Yoong Ahm; Noguchi, Minoru; Fujino, Takeshi; Oyama, Shigeki; Endo, Morinobu

    2012-03-12

    Supercapacitors can store and deliver energy by a simple charge separation, and thus they could be an attractive option to meet transient high energy density in operating fuel cells and in electric and hybrid electric vehicles. To achieve such requirements, intensive studies have been carried out to improve the volumetric capacitance in supercapacitors using various types and forms of carbons including carbon nanotubes and graphenes. However, conventional porous carbons are not suitable for use as electrode material in supercapacitors for such high energy density applications. Here, we show that edge-enriched porous carbons are the best electrode material for high energy density supercapacitors to be used in vehicles as an auxiliary powertrain. Molten potassium hydroxide penetrates well-aligned graphene layers vertically and consequently generates both suitable pores that are easily accessible to the electrolyte and a large fraction of electrochemically active edge sites. We expect that our findings will motivate further research related to energy storage devices and also environmentally friendly electric vehicles. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. Quality improvement of gluten-free bread based on soybean and enriched with sugar beet molasses

    Directory of Open Access Journals (Sweden)

    Šimurina Olivera D.

    2017-01-01

    Full Text Available The aim of this work was to improve the quality of gluten-free bread made with high content of soy flour and enriched with sugar beet molasses by incorporating ingredients with a potential to simultaneously enhance the nutritional quality of the breads. The following ingredients were used: pea protein isolate, pea fibre and chia seeds. The chosen ingredients exerted positive effects on bread quality. They promoted volume increase and crumb softening. In this respect, the most effective ingredients were pea protein isolate (at 1% supplementation level, pea fibre (at up to 2% supplementation level and chia seeds (at 1% supplementation level. The sensory analysis revealed that pea fibre and chia addition at 1 and 2% supplementation level provided bread with higher scores regarding overall acceptance, crumb texture and taste. At 1% supplementation level, there was not found statistically significant difference in sensory attributes of bread supplemented with pea protein isolate in comparison to the control. However, pea protein isolate was found to strongly diminish bread taste at 4% supplementation level due to presence of beany taste.

  18. Quantitative Secretome Analysis of Activated Jurkat Cells Using Click Chemistry-Based Enrichment of Secreted Glycoproteins.

    Science.gov (United States)

    Witzke, Kathrin E; Rosowski, Kristin; Müller, Christian; Ahrens, Maike; Eisenacher, Martin; Megger, Dominik A; Knobloch, Jürgen; Koch, Andrea; Bracht, Thilo; Sitek, Barbara

    2017-01-06

    Quantitative secretome analyses are a high-performance tool for the discovery of physiological and pathophysiological changes in cellular processes. However, serum supplements in cell culture media limit secretome analyses, but serum depletion often leads to cell starvation and consequently biased results. To overcome these limiting factors, we investigated a model of T cell activation (Jurkat cells) and performed an approach for the selective enrichment of secreted proteins from conditioned medium utilizing metabolic marking of newly synthesized glycoproteins. Marked glycoproteins were labeled via bioorthogonal click chemistry and isolated by affinity purification. We assessed two labeling compounds conjugated with either biotin or desthiobiotin and the respective secretome fractions. 356 proteins were quantified using the biotin probe and 463 using desthiobiotin. 59 proteins were found differentially abundant (adjusted p-value ≤0.05, absolute fold change ≥1.5) between inactive and activated T cells using the biotin method and 86 using the desthiobiotin approach, with 31 mutual proteins cross-verified by independent experiments. Moreover, we analyzed the cellular proteome of the same model to demonstrate the benefit of secretome analyses and provide comprehensive data sets of both. 336 proteins (61.3%) were quantified exclusively in the secretome. Data are available via ProteomeXchange with identifier PXD004280.

  19. Event-Based Media Enrichment Using an Adaptive Probabilistic Hypergraph Model.

    Science.gov (United States)

    Liu, Xueliang; Wang, Meng; Yin, Bao-Cai; Huet, Benoit; Li, Xuelong

    2015-11-01

    Nowadays, with the continual development of digital capture technologies and social media services, a vast number of media documents are captured and shared online to help attendees record their experience during events. In this paper, we present a method combining semantic inference and multimodal analysis for automatically finding media content to illustrate events using an adaptive probabilistic hypergraph model. In this model, media items are taken as vertices in the weighted hypergraph and the task of enriching media to illustrate events is formulated as a ranking problem. In our method, each hyperedge is constructed using the K-nearest neighbors of a given media document. We also employ a probabilistic representation, which assigns each vertex to a hyperedge in a probabilistic way, to further exploit the correlation among media data. Furthermore, we optimize the hypergraph weights in a regularization framework, which is solved as a second-order cone problem. The approach is initiated by seed media and then used to rank the media documents using a transductive inference process. The results obtained from validating the approach on an event dataset collected from EventMedia demonstrate the effectiveness of the proposed approach.

  20. Development of functional milk desserts enriched with resistant starch based on consumers' perception.

    Science.gov (United States)

    Ares, Florencia; Arrarte, Eloísa; De León, Tania; Ares, Gastón; Gámbaro, Adriana

    2012-10-01

    Sensory characteristics play a key role in determining consumers' acceptance of functional foods. In this context, the aim of the present work was to apply a combination of sensory and consumer methodologies to the development of chocolate milk desserts enriched with resistant starch. Chocolate milk desserts containing modified waxy maize starch were formulated with six different concentrations of two types of resistant starch (which are part of insoluble dietary fiber). The desserts were evaluated by trained assessors using Quantitative Descriptive Analysis. Moreover, consumers scored their overall liking and willingness to purchase and answered an open-ended question. Resistant starch caused significant changes in the sensory characteristics of the desserts and a significant decrease in consumers' overall liking and willingness to purchase. Consumer data was analyzed applying survival analysis on overall liking scores, considering the risk on consumers liking and willing to purchase the functional products less than their regular counterparts. The proposed methodologies proved to be useful to develop functional foods taking into account consumers' perception, which could increase their success in the market.

  1. Epigenomic annotation-based interpretation of genomic data: from enrichment analysis to machine learning.

    Science.gov (United States)

    Dozmorov, Mikhail G

    2017-10-15

    One of the goals of functional genomics is to understand the regulatory implications of experimentally obtained genomic regions of interest (ROIs). Most sequencing technologies now generate ROIs distributed across the whole genome. The interpretation of these genome-wide ROIs represents a challenge as the majority of them lie outside of functionally well-defined protein coding regions. Recent efforts by the members of the International Human Epigenome Consortium have generated volumes of functional/regulatory data (reference epigenomic datasets), effectively annotating the genome with epigenomic properties. Consequently, a wide variety of computational tools has been developed utilizing these epigenomic datasets for the interpretation of genomic data. The purpose of this review is to provide a structured overview of practical solutions for the interpretation of ROIs with the help of epigenomic data. Starting with epigenomic enrichment analysis, we discuss leading tools and machine learning methods utilizing epigenomic and 3D genome structure data. The hierarchy of tools and methods reviewed here presents a practical guide for the interpretation of genome-wide ROIs within an epigenomic context. mikhail.dozmorov@vcuhealth.org. Supplementary data are available at Bioinformatics online. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  2. Highly-Bioreactive Silica-Based Mesoporous Bioactive Glasses Enriched with Gallium(III

    Directory of Open Access Journals (Sweden)

    Sandra Sanchez-Salcedo

    2018-03-01

    Full Text Available Beneficial effects in bone cell growth and antibacterial action are currently attributed to Ga3+ ions. Thus, they can be used to upgrade mesoporous bioactive glasses (MBGs, investigated for tissue engineering, whenever they released therapeutic amounts of gallium ions to the surrounding medium. Three gallium-enriched MBGs with composition (in mol % xSiO2–yCaO–zP2O5–5Ga2O3, being x = 70, y = 15, z = 10 for Ga_1; x = 80, y = 12, z = 3 for Ga_2; and x = 80, y = 15, z = 0 for Ga_3, were investigated and compared with the gallium-free 80SiO2–15CaO–5P2O5 MBG (B. 29Si and 31P MAS NMR analyses indicated that Ga3+ acts as network modifier in the glass regions with higher polymerization degree and as network former in the zones with high concentration of classical modifiers (Ca2+ ions. Ga_1 and Ga_2 exhibited a quick in vitro bioactive response because they were coated by an apatite-like layer after 1 and 3 days in simulated body fluid. Although we have not conducted biological tests in this paper (cells or bacteria, Ga_1 released high but non-cytotoxic amounts of Ga3+ ions in Todd Hewitt Broth culture medium that were 140 times higher than the IC90 of Pseudomonas aeruginosa bacteria, demonstrating its potential for tissue engineering applications.

  3. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  4. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  5. An evaluation of the hemiplegic subject based on the Bobath approach. Part II: The evaluation protocol.

    Science.gov (United States)

    Corriveau, H; Guarna, F; Dutil, E; Riley, E; Arsenault, A B; Drouin, G

    1988-01-01

    A protocol of evaluation of the hemiplegic patient based on the Bobath approach to treatment is presented. Six parameters are evaluated: sensorium, muscle tone, reflex activity, active movement, postural reactions and pain. The first and last of these are included because of their possible effects on the motor recovery process of the hemiplegic patient. The other four are directly borrowed from the Bobath modality of treatment. For each of these parameters, the procedures are given for its evaluation along with its respective rating scales. These scales are of an ordinal nature ranging from 0 to 3. It is suggested that this new evaluation protocol is fully compatible with the therapeutic modality developed by Bobath and as well is adequate to quantify patient progress in the principle aspects treated by this well used rehabilitation approach.

  6. Improvement in QA protocol for TLD based personnel monitoring laboratory in last five year

    International Nuclear Information System (INIS)

    Rakesh, R.B.

    2018-01-01

    The Quality Assurance (QA) in Personnel monitoring (PM) is a tool to assess the performance of PM laboratories and reliability of dose estimation with respect to standards laid down by international agencies such as IAEA (ISO trumpet curve), IEC, ANSI etc. Reliable personal dose estimation is a basic requirement for radiation protection planning as well as decision making continuous improvement in radiation protection is inherent in radiation protection practices which is highly dependent on accuracy and reliability of the monitoring data. Experience based evolution of Quality control (QC) measures as well as Quality assurance (QA) protocol are two important aspects towards continuous improvement in accuracy and reliability of personnel monitoring results. The paper describes improvement in QC measures and QA protocols initiated during the last five years which led to improvement in the quality of PM services

  7. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  8. Improvement of the SEP protocol based on community structure of node degree

    Science.gov (United States)

    Li, Donglin; Wei, Suyuan

    2017-05-01

    Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.

  9. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  10. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  11. A data base for PHW reactor operating on a once-through, low enriched uranium-thorium cycle

    International Nuclear Information System (INIS)

    Lungu, S.

    1984-04-01

    The study of a detailed data base for a new once-through uranium-thorium cycle using low enriched uranium (4 and 5,5% wt. U-235) and distinct UO 2 and ThO 2 fuel channels has been performed. With reference to a standard 638 MWe CANDU-type PHWR with 380 channels, evaluation of economics, fuel behaviour and safety has been performed. The Feinberg-Galanin method (code FEINGAL) has been used for calculation of axial flux distribution. All parameters have been provided by LATREP code following up the irradiation history. Economical assessment has shown that this fuel cycle is competitive with the natural uranium fuel cycle for 1979-based values of the parameters. Fuel behaviour and safety features modelling has shown that core behaviour of the uranium-thorium reactor under abnormal and accident conditions would be at least as good as that of the standard natural uranium reactor

  12. Imaging-based enrichment criteria using deep learning algorithms for efficient clinical trials in mild cognitive impairment.

    Science.gov (United States)

    Ithapu, Vamsi K; Singh, Vikas; Okonkwo, Ozioma C; Chappell, Richard J; Dowling, N Maritza; Johnson, Sterling C

    2015-12-01

    The mild cognitive impairment (MCI) stage of Alzheimer's disease (AD) may be optimal for clinical trials to test potential treatments for preventing or delaying decline to dementia. However, MCI is heterogeneous in that not all cases progress to dementia within the time frame of a trial and some may not have underlying AD pathology. Identifying those MCIs who are most likely to decline during a trial and thus most likely to benefit from treatment will improve trial efficiency and power to detect treatment effects. To this end, using multimodal, imaging-derived, inclusion criteria may be especially beneficial. Here, we present a novel multimodal imaging marker that predicts future cognitive and neural decline from [F-18]fluorodeoxyglucose positron emission tomography (PET), amyloid florbetapir PET, and structural magnetic resonance imaging, based on a new deep learning algorithm (randomized denoising autoencoder marker, rDAm). Using ADNI2 MCI data, we show that using rDAm as a trial enrichment criterion reduces the required sample estimates by at least five times compared with the no-enrichment regime and leads to smaller trials with high statistical power, compared with existing methods. Copyright © 2015 The Alzheimer's Association. Published by Elsevier Inc. All rights reserved.

  13. Comparison of PCR-Based Diagnosis with Centrifuged-Based Enrichment Method for Detection of Borrelia persica in Animal Blood Samples.

    Science.gov (United States)

    Naddaf, S R; Kishdehi, M; Siavashi, Mr

    2011-01-01

    The mainstay of diagnosis of relapsing fever (RF) is demonstration of the spirochetes in Giemsa-stained thick blood smears, but during non fever periods the bacteria are very scanty and rarely detected in blood smears by microscopy. This study is aimed to evaluate the sensitivity of different methods developed for detection of low-grade spirochetemia. Animal blood samples with low degrees of spirochetemia were tested with two PCRs and a nested PCR targeting flaB, GlpQ, and rrs genes. Also, a centrifuged-based enrichment method and Giemsa staining were performed on blood samples with various degrees of spirochetemia. The flaB-PCR and nested rrs-PCR turned positive with various degrees of spirochetemia including the blood samples that turned negative with dark-field microscopy. The GlpQ-PCR was positive as far as at least one spirochete was seen in 5-10 microscopic fields. The sensitivity of GlpQ-PCR increased when DNA from Buffy Coat Layer (BCL) was used as template. The centrifuged-based enrichment method turned positive with as low concentration as 50 bacteria/ml blood, while Giemsa thick staining detected bacteria with concentrations ≥ 25000 bacteria/ml. Centrifuged-based enrichment method appeared as much as 500-fold more sensitive than thick smears, which makes it even superior to some PCR assays. Due to simplicity and minimal laboratory requirements, this method can be considered a valuable tool for diagnosis of RF in rural health centers.

  14. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    International Nuclear Information System (INIS)

    Farooq, Hasan; Jung, Low Tang

    2013-01-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  15. Standardized terminology for clinical trial protocols based on top-level ontological categories.

    Science.gov (United States)

    Heller, B; Herre, H; Lippoldt, K; Loeffler, M

    2004-01-01

    This paper describes a new method for the ontologically based standardization of concepts with regard to the quality assurance of clinical trial protocols. We developed a data dictionary for medical and trial-specific terms in which concepts and relations are defined context-dependently. The data dictionary is provided to different medical research networks by means of the software tool Onto-Builder via the internet. The data dictionary is based on domain-specific ontologies and the top-level ontology of GOL. The concepts and relations described in the data dictionary are represented in natural language, semi-formally or formally according to their use.

  16. Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

    Directory of Open Access Journals (Sweden)

    Majid Mumtaz

    2016-10-01

    Full Text Available Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509 certificates. The system uses Public Key Infrastructure (PKI, challenge/response protocol, mobile proxy servers, and Java cards with crypto capabilities used as a Secure Element. Innovative design of the protocol, its implementation, and evaluation results are described. In addition to end-user authentication, the described solution also supports the use of X.509 certificates for additional security services – confidentiality, integrity, and non-repudiation of transactions and data in an open network environment. The system uses Application Programming Interfaces (APIs to access Java cards functions and credentials that can be used as add-ons to enhance any mobile application with security features and services.

  17. An evidence based protocol for peer review of radiographer musculoskeletal plain film reporting

    International Nuclear Information System (INIS)

    Stephenson, Paul; Hannah, April; Jones, Helen; Edwards, Rosemary; Harrington, Kate; Baker, Sally-Anne; Fitzgerald, Nicole; Belfield, Jane

    2012-01-01

    Aims: Medical image interpretation by non-medically trained staff continues to court controversy. This article aims to show that any potential risks associated with radiographer reporting can be monitored and mitigated if a robust peer review system is introduced. A search of the evidence base illustrates a paucity of guidance on how reporting radiographers should be audited or how a peer review process should be implemented. A practical framework for designing a reporting radiographer peer review process is provided. Methods: Following a literature review, key issues faced when designing a peer review protocol were identified. The following questions are answered: How frequent should peer review take place? How many reports should be reviewed? How are reports selected for review? Who should peer review the radiographer reports? How should radiographer's reporting performance be measured? What standard of reporting is acceptable? Results: Details are provided of the process that has been used for over three years at a busy inner-city teaching hospital for auditing musculoskeletal plain film radiographer reporting. The peer review method presented is not intended to produce robust statistical data; it is a practical method of locally assessing the reporting competency. As such, our protocol should be viewed as part of a larger programme for continuing professional development. Conclusion: It is hoped that this practical protocol will encourage radiology departments to engage in a programme of peer review for reporting radiographers.

  18. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  19. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  20. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  1. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  2. Radiometric enrichment of nonradioactive ores

    International Nuclear Information System (INIS)

    Mokrousov, V.A.; Lileev, V.A.

    1979-01-01

    Considered are the methods of mineral enrichment based on the use of the radioation of various types. The physical essence of enrichment processes is presented, their classification is given. Described are the ore properties influencing the efficiency of radiometric enrichment, methods of the properties study and estimation of ore enrichment. New possibilities opened by radiometric enrichment in the technology of primary processing of mineral raw materials are elucidated. A considerable attention is paid to the main and auxiliary equipment for radiometric enrichment. The foundations of the safety engineering are presented in a brief form. Presented are also results of investigations and practical works in the field of enrichment of ores of non-ferrous, ferrous and non-metallic minerals with the help of radiometric methods

  3. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  4. Leader-Following Consensus Stability of Discrete-Time Linear Multiagent Systems with Observer-Based Protocols

    Directory of Open Access Journals (Sweden)

    Bingbing Xu

    2013-01-01

    Full Text Available We consider the leader-following consensus problem of discrete-time multiagent systems on a directed communication topology. Two types of distributed observer-based consensus protocols are considered to solve such a problem. The observers involved in the proposed protocols include full-order observer and reduced-order observer, which are used to reconstruct the state variables. Two algorithms are provided to construct the consensus protocols, which are based on the modified discrete-time algebraic Riccati equation and Sylvester equation. In light of graph and matrix theory, some consensus conditions are established. Finally, a numerical example is provided to illustrate the obtained result.

  5. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    Science.gov (United States)

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation.

  6. Targeted Screening With Combined Age- and Morphology-Based Criteria Enriches Detection of Lynch Syndrome in Endometrial Cancer.

    Science.gov (United States)

    Lin, Douglas I; Hecht, Jonathan L

    2016-06-01

    Endometrial cancer is associated with Lynch syndrome in 2% to 6% of cases. Adequate screening may prevent of a second cancer and incident cancers in family members via risk-reducing strategies. The goal of the study was to evaluate the detection rate of Lynch syndrome via a targeted screening approach. In 2009, we incorporated targeted Lynch syndrome screening via immunohistochemistry for MLH1, PMS2, MSH2, and MSH6, followed by MLH1 promoter hypermethylation, in select cases of endometrial carcinoma. Criteria for patient selection included (1) all patients Lynch syndrome. Therefore, targeted screening with combined age and morphology based criteria enriches detection of Lynch syndrome in endometrial cancer. However, the detection rate is lower than the rates from published series that offer universal screening. © The Author(s) 2016.

  7. HPeak: an HMM-based algorithm for defining read-enriched regions in ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Maher Christopher A

    2010-07-01

    Full Text Available Abstract Background Protein-DNA interaction constitutes a basic mechanism for the genetic regulation of target gene expression. Deciphering this mechanism has been a daunting task due to the difficulty in characterizing protein-bound DNA on a large scale. A powerful technique has recently emerged that couples chromatin immunoprecipitation (ChIP with next-generation sequencing, (ChIP-Seq. This technique provides a direct survey of the cistrom of transcription factors and other chromatin-associated proteins. In order to realize the full potential of this technique, increasingly sophisticated statistical algorithms have been developed to analyze the massive amount of data generated by this method. Results Here we introduce HPeak, a Hidden Markov model (HMM-based Peak-finding algorithm for analyzing ChIP-Seq data to identify protein-interacting genomic regions. In contrast to the majority of available ChIP-Seq analysis software packages, HPeak is a model-based approach allowing for rigorous statistical inference. This approach enables HPeak to accurately infer genomic regions enriched with sequence reads by assuming realistic probability distributions, in conjunction with a novel weighting scheme on the sequencing read coverage. Conclusions Using biologically relevant data collections, we found that HPeak showed a higher prevalence of the expected transcription factor binding motifs in ChIP-enriched sequences relative to the control sequences when compared to other currently available ChIP-Seq analysis approaches. Additionally, in comparison to the ChIP-chip assay, ChIP-Seq provides higher resolution along with improved sensitivity and specificity of binding site detection. Additional file and the HPeak program are freely available at http://www.sph.umich.edu/csg/qin/HPeak.

  8. Sample pre-concentration with high enrichment factors at a fixed location in paper-based microfluidic devices.

    Science.gov (United States)

    Yeh, Shih-Hao; Chou, Kuang-Hua; Yang, Ruey-Jen

    2016-03-07

    The lack of sensitivity is a major problem among microfluidic paper-based analytical devices (μPADs) for early disease detection and diagnosis. Accordingly, the present study presents a method for improving the enrichment factor of low-concentration biomarkers by using shallow paper-based channels realized through a double-sided wax-printing process. In addition, the enrichment factor is further enhanced by exploiting the ion concentration polarization (ICP) effect on the cathodic side of the nanoporous membrane, in which a stationary sample plug is obtained. The occurrence of ICP on the shallow-channel μPAD is confirmed by measuring the current-voltage response as the external voltage is increased from 0 to 210 V (or the field strength from 0 to 1.05 × 10(4) V m(-1)) over 600 s. In addition, to the best of our knowledge, the electroosmotic flow (EOF) speed on the μPAD fabricated with a wax-channel is measured for the first time using a current monitoring method. The experimental results show that for a fluorescein sample, the concentration factor is increased from 130-fold in a conventional full-thickness paper channel to 944-fold in the proposed shallow channel. Furthermore, for a fluorescein isothiocyanate-labeled bovine serum albumin (FITC-BSA) sample, the proposed shallow-channel μPAD achieves an 835-fold improvement in the concentration factor. The concentration technique presented here provides a novel strategy for enhancing the detection sensitivity of μPAD applications.

  9. An ICT-Based Platform to Monitor Protocols in the Healthcare Environment.

    Science.gov (United States)

    Rorís, Víctor M Alonso; Gago, Juan M Santos; Sabucedo, Luis Álvarez; Merino, Mateo Ramos; Valero, Javier Sanz

    2016-10-01

    Procedures from the healthcare domain involve highly critical actions as they may pose a risk for patients' life. Therefore, a large effort is devoted to the standardization in clinical praxis and to the control of quality for these protocols in order to minimize hazards. In this line, this work is compelled to provide an ICT-based support to carry out these controls in a simple and effective manner. Using a methodology based on HACCP and taking advantage of Semantic tools, a holistic platform of services for traceability and control of processes has been designed and implemented. The applied paradigm is based on the use of Control Points as singular points to generate traces using observations and measures relevant for the processes considered. Based on those, it is possible to offer services for advanced querying and knowledge inference. The local deployment just requires regular mobile phones or tablets making this solution cost-effective and easily replicable.

  10. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  11. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  12. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  13. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  14. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

    Directory of Open Access Journals (Sweden)

    Anup Kumar Maurya

    2017-10-01

    Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.

  15. Towards a CPN-Based Modelling Approach for Reconciling Verification and Implementation of Protocol Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2013-01-01

    Formal modelling of protocols is often aimed at one specific purpose such as verification or automatically generating an implementation. This leads to models that are useful for one purpose, but not for others. Being able to derive models for verification and implementation from a single model...... is beneficial both in terms of reduced total modelling effort and confidence that the verification results are valid also for the implementation model. In this paper we introduce the concept of a descriptive specification model and an approach based on refining a descriptive model to target both verification...... how this model can be refined to target both verification and implementation....

  16. Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

    OpenAIRE

    Fu, Yue

    2017-01-01

    In this paper a secure data-sharing protocol under blockchain-based decentralised storage architecture is proposed, which fulfils users who need to share their encrypted data on-cloud. It implements a remote data-sharing mechanism that enables data owners to share their encrypted data to other users without revealing the original key. Nor do they have to download on-cloud data with re-encryption and re-uploading. Data security as well as efficiency are ensured by symmetric encryption, whose k...

  17. A PCR-based protocol to accurately size C9orf72 intermediate-length alleles.

    Science.gov (United States)

    Biasiotto, Giorgio; Archetti, Silvana; Di Lorenzo, Diego; Merola, Francesca; Paiardi, Giulia; Borroni, Barbara; Alberici, Antonella; Padovani, Alessandro; Filosto, Massimiliano; Bonvicini, Cristian; Caimi, Luigi; Zanella, Isabella

    2017-04-01

    Although large expansions of the non-coding GGGGCC repeat in C9orf72 gene are clearly defined as pathogenic for Amyotrophic Lateral Sclerosis (ALS) and Frontotemporal Lobar Degeneration (FTLD), intermediate-length expansions have also been associated with those and other neurodegenerative diseases. Intermediate-length allele sizing is complicated by intrinsic properties of current PCR-based methodologies, in that somatic mosaicism could be suspected. We designed a protocol that allows the exact sizing of intermediate-length alleles, as well as the identification of large expansions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Power Management Based Grid Routing Protocol for IEEE 802.11 Based MANET

    Institute of Scientific and Technical Information of China (English)

    XU Li; ZHENG Bao-yu; YANG Zhen

    2004-01-01

    MANET ( Mobile Ad Hoc Network ) is a collection of wireless mobile nodes forming a temporary communication network without the aid of any established infrastructure or centralized administration. The lifetime of a MANET depends on the battery resources of the mobile nodes. So energy consumption may one of important design criterions for MANET. With changing the idle model to sleep model in the grid environment, this paper proposes a new energy-aware routing protocol. Performance simulation results show that the proposed strategy can dynamic balance the traffic load inside the whole network, extend the lifetime of a MANET, and without decreasing the throughput ratio.

  19. A Game Theory-Based Obstacle Avoidance Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shujun Bi

    2011-09-01

    Full Text Available The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes.

  20. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    Science.gov (United States)

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  1. A New QKD Protocol Based upon Authentication by EPR Entanglement State

    Science.gov (United States)

    Abushgra, Abdulbast A.

    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the

  2. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  3. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  4. Enrichment of true positives from structural alerts through the use of novel atomic fragment based descriptors

    DEFF Research Database (Denmark)

    Long, A.; Rydberg, Patrik

    2013-01-01

    To enhance the discrimination rate for methods applying structural alerts and biotransformation rules in the prediction of toxicity and drug metabolism we have developed a set of novel fragment based atomic descriptors. These atomic descriptors encode the properties of the fragments separating an...

  5. Data base for a CANDU-PHW operating on a once-through, slightly enriched uranium cycle (AECL-6594)

    International Nuclear Information System (INIS)

    1979-07-01

    This report, prepared for INFCE, gives data for an extrapolated 1000 MW(e) CANDU-PHW design operating on a once-through fuel cycle with a feed fuel of slightly enriched uranium - 1.2 weight % U-235 in uranium. The effects of varying fuel enrichment, maximum channel power, and economic parameters are also discussed

  6. A feedback-retransmission based asynchronous frequency hopping MAC protocol for military aeronautical ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jinhui TANG

    2018-05-01

    Full Text Available Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control (MAC designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access (FRMA control protocol is proposed. Burst communication, asynchronous Frequency Hopping (FH, channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved. Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol. Keywords: Ad hoc networks, Aeronautical communications, Frequency hopping, Media Access Control (MAC, Time-sensitive

  7. A Mirror Therapy-Based Action Observation Protocol to Improve Motor Learning After Stroke.

    Science.gov (United States)

    Harmsen, Wouter J; Bussmann, Johannes B J; Selles, Ruud W; Hurkmans, Henri L P; Ribbers, Gerard M

    2015-07-01

    Mirror therapy is a priming technique to improve motor function of the affected arm after stroke. To investigate whether a mirror therapy-based action observation (AO) protocol contributes to motor learning of the affected arm after stroke. A total of 37 participants in the chronic stage after stroke were randomly allocated to the AO or control observation (CO) group. Participants were instructed to perform an upper-arm reaching task as fast and as fluently as possible. All participants trained the upper-arm reaching task with their affected arm alternated with either AO or CO. Participants in the AO group observed mirrored video tapes of reaching movements performed by their unaffected arm, whereas participants in the CO group observed static photographs of landscapes. The experimental condition effect was investigated by evaluating the primary outcome measure: movement time (in seconds) of the reaching movement, measured by accelerometry. Movement time decreased significantly in both groups: 18.3% in the AO and 9.1% in the CO group. Decrease in movement time was significantly more in the AO compared with the CO group (mean difference = 0.14 s; 95% confidence interval = 0.02, 0.26; P = .026). The present study showed that a mirror therapy-based AO protocol contributes to motor learning after stroke. © The Author(s) 2014.

  8. Quality of life and myelomeningocele: an ethical and evidence-based analysis of the Groningen Protocol.

    Science.gov (United States)

    Barry, Sean

    2010-01-01

    In 2005, a group of pediatricians at the University Medical Center in Groningen, The Netherlands, published the Groningen Protocol (GP) for Euthanasia in Newborns. This protocol is a set of guidelines devised in 2001 to clarify and facilitate the assessment of clinically stable neonates deemed to be in unbearable suffering for whom the prognosis is felt to be hopeless. At the time of publication, the GP had been in use for 7 years, and 22 patients, all with diagnosed myelomeningocele (MMC), had met the selection criteria for euthanasia by lethal injection. MMC is the most common neurological congenital anomaly, affecting approximately 300,000 newborns yearly worldwide. Neurosurgeons have a unique perspective on this disease and therefore an important voice, given the significant role they have in caring for these patients at all stages of their lives. This paper reviews the principal ethical arguments presented to date in the literature regarding the GP. It also provides an evidence-based critique of the GP in light of quality-of-life studies addressing adults with MMC, and ascertains whether or not the GP meets the criteria for an evidence-based guideline. Copyright © 2011 S. Karger AG, Basel.

  9. Individualized music for dementia: Evolution and application of evidence-based protocol.

    Science.gov (United States)

    Gerdner, Linda A

    2012-04-22

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.

  10. Complications are reduced with a protocol to standardize timing of fixation based on response to resuscitation.

    Science.gov (United States)

    Vallier, Heather A; Moore, Timothy A; Como, John J; Wilczewski, Patricia A; Steinmetz, Michael P; Wagner, Karl G; Smith, Charles E; Wang, Xiao-Feng; Dolenc, Andrea J

    2015-10-01

    Our group developed a protocol, entitled Early Appropriate Care (EAC), to determine timing of definitive fracture fixation based on presence and severity of metabolic acidosis. We hypothesized that utilization of EAC would result in fewer complications than a historical cohort and that EAC patients with definitive fixation within 36 h would have fewer complications than those treated at a later time. Three hundred thirty-five patients with mean age 39.2 years and mean Injury Severity Score (ISS) 26.9 and 380 fractures of the femur (n = 173), pelvic ring (n = 71), acetabulum (n = 57), and/or spine (n = 79) were prospectively evaluated. The EAC protocol recommended definitive fixation within 36 h if lactate <4.0 mmol/L, pH ≥7.25, or base excess (BE) ≥-5.5 mmol/L. Complications including infections, sepsis, DVT, organ failure, pneumonia, acute respiratory distress syndrome (ARDS), and pulmonary embolism (PE) were identified and compared for early and delayed patients and with a historical cohort. All 335 patients achieved the desired level of resuscitation within 36 h of injury. Two hundred sixty-nine (80%) were treated within 36 h, and 66 had protocol violations, treated on a delayed basis, due to surgeon choice in 71%. Complications occurred in 16.3% of patients fixed within 36 h and in 33.3% of delayed patients (p = 0.0009). Hospital and ICU stays were shorter in the early group: 9.5 versus 17.3 days and 4.4 versus 11.6 days, respectively, both p < 0.0001. This group of patients when compared with a historical cohort of 1443 similar patients with 1745 fractures had fewer complications (16.3 versus 22.1%, p = 0.017) and shorter length of stay (LOS) (p = 0.018). Our EAC protocol recommends definitive fixation within 36 h in resuscitated patients. Early fixation was associated with fewer complications and shorter LOS. The EAC recommendations are safe and effective for the majority of severely injured patients with mechanically

  11. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

    Directory of Open Access Journals (Sweden)

    Alaauldin Ibrahim

    2017-01-01

    Full Text Available Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. Unlike existing authentication protocols, which only send the tag ID securely, the proposed protocol could also send the valuable data stored in the tag in an encrypted pattern. The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag. The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.

  12. Comparison of PCR-Based Diagnosis with Centrifuged-Based Enrichment Method for Detection of Borrelia Persica in Animal Blood Samples

    Directory of Open Access Journals (Sweden)

    SR Naddaf

    2011-06-01

    Full Text Available Background: The mainstay of diagnosis of relapsing fever (RF is demonstration of the spirochetes in Giemsa-stained thick blood smears, but during non fever periods the bacteria are very scanty and rarely detected in blood smears by mi­cros­copy. This study is aimed to evaluate the sensitivity of different methods developed for detection of low-grade spi­ro­chetemia. Methods: Animal blood samples with low degrees of spirochetemia were tested with two PCRs and a nested PCR tar­get­ing flaB, GlpQ, and rrs genes. Also, a centrifuged-based enrichment method and Giemsa staining were per­formed on blood samples with various degrees of spirochetemia. Results: The flaB-PCR and nested rrs-PCR turned positive with various degrees of spirochetemia including the blood samples that turned negative with dark-field microscopy. The GlpQ-PCR was positive as far as at least one spi­ro­chete was seen in 5-10 microscopic fields. The sensitivity of GlpQ-PCR increased when DNA from Buffy Coat Layer (BCL was used as template. The centrifuged-based enrichment method turned positive with as low concentra­tion as 50 bacteria/ml blood, while Giemsa thick staining detected bacteria with concentrations ≥ 25000 bacteria/ml. Conclusion: Centrifuged-based enrichment method appeared as much as 500-fold more sensitive than thick smears, which makes it even superior to some PCR assays. Due to simplicity and minimal laboratory requirements, this method can be considered a valuable tool for diagnosis of RF in rural health centers.

  13. Comparison of PCR-Based Diagnosis with Centrifuged-Based Enrichment Method for Detection of Borrelia persica in Animal Blood Samples

    Directory of Open Access Journals (Sweden)

    SR Naddaf

    2011-06-01

    Background: The mainstay of diagnosis of relapsing fever (RF is demonstration of the spirochetes in Giemsa-stained thick blood smears, but during non fever periods the bacteria are very scanty and rarely detected in blood smears by mi­cros­copy. This study is aimed to evaluate the sensitivity of different methods developed for detection of low-grade spi­ro­chetemia. Methods: Animal blood samples with low degrees of spirochetemia were tested with two PCRs and a nested PCR tar­get­ing flaB, GlpQ, and rrs genes. Also, a centrifuged-based enrichment method and Giemsa staining were per­formed on blood samples with various degrees of spirochetemia. Results: The flaB-PCR and nested rrs-PCR turned positive with various degrees of spirochetemia including the blood samples that turned negative with dark-field microscopy. The GlpQ-PCR was positive as far as at least one spi­ro­chete was seen in 5-10 microscopic fields. The sensitivity of GlpQ-PCR increased when DNA from Buffy Coat Layer (BCL was used as template. The centrifuged-based enrichment method turned positive with as low concentra­tion as 50 bacteria/ml blood, while Giemsa thick staining detected bacteria with concentrations ≥ 25000 bacteria/ml.  Conclusion: Centrifuged-based enrichment method appeared as much as 500-fold more sensitive than thick smears, which makes it even superior to some PCR assays. Due to simplicity and minimal laboratory requirements, this method can be considered a valuable tool for diagnosis of RF in rural health centers.  

  14. A Walk-based Semantically Enriched Tree Kernel Over Distributed Word Representations

    DEFF Research Database (Denmark)

    Srivastava, Shashank; Hovy, Dirk

    2013-01-01

    We propose a walk-based graph kernel that generalizes the notion of tree-kernels to continuous spaces. Our proposed approach subsumes a general framework for word-similarity, and in particular, provides a flexible way to incorporate distributed representations. Using vector representations......, such an approach captures both distributional semantic similarities among words as well as the structural relations between them (encoded as the structure of the parse tree). We show an efficient formulation to compute this kernel using simple matrix multiplication operations. We present our results on three...

  15. Modular enrichment measurement system for in-situ enrichment assay

    International Nuclear Information System (INIS)

    Stewart, J.P.

    1976-01-01

    A modular enrichment measurement system has been designed and is in operation within General Electric's Nuclear Fuel Fabrication Facility for the in-situ enrichment assay of uranium-bearing materials in process containers. This enrichment assay system, which is based on the ''enrichment meter'' concept, is an integral part of the site's enrichment control program and is used in the in-situ assay of the enrichment of uranium dioxide (UO 2 ) powder in process containers (five gallon pails). The assay system utilizes a commercially available modular counting system and a collimnator designed for compatability with process container transport lines and ease of operator access. The system has been upgraded to include a microprocessor-based controller to perform system operation functions and to provide data acquisition and processing functions. Standards have been fabricated and qualified for the enrichment assay of several types of uranium-bearing materials, including UO 2 powders. The assay system has performed in excess of 20,000 enrichment verification measurements annually and has significantly contributed to the facility's enrichment control program

  16. Faith-Based Organizations and Veteran Reintegration: Enriching the Web of Support.

    Science.gov (United States)

    Werber, Laura; Derose, Kathryn Pitkin; Rudnick, Mollie; Harrell, Margaret C; Naranjo, Diana

    2015-11-30

    Faith-based organizations (FBOs) are an important community-based resource for veterans as they readjust to civilian life. Through interviews with both national-level and smaller, local FBOs, the authors sought to understand better the current and potential roles for FBOs in veteran reintegration. Interviewees suggested that veterans may look to FBOs for support because they offer privacy and confidentiality, two features that may be especially critical when a potential stigma is involved. Some FBOs have also developed a reputation as safe places for veterans, providing supportive, judgment-free environments. FBOs not only help veterans with spiritual matters but address diverse areas of veteran health and wellness, including vocation, education, financial and legal stability, shelter, access to goods and services, mental health, access to health care, physical health, family, and social networks. In some cases, the support is offered to veterans directly; in other instances, the support is indirect, via training individuals to help veterans or educating the public about them. In the process of providing support, FBOs interact with varied organizations, including government entities, private nonprofits, and one another, for training, outreach, referrals, information exchange, obtaining donations, and collaboration. Yet challenges exist, including insufficient connections with chaplains working in different settings and others in the web of support, resource and capacity constraints, lack of awareness of experience with veterans, issues related to religious philosophy or orientation, and characteristics of veterans themselves. To move forward, the authors offer recommendations for policymakers, organizations that interact with FBOs, and FBOs themselves to help FBOs engage fully in the web of reintegration support.

  17. RFID Cryptographic Protocol Based on Cyclic Redundancy Check for High Efficiency

    Directory of Open Access Journals (Sweden)

    Nian Liu

    2014-04-01

    Full Text Available In this paper, RFID encryption protocol is proposed based on the security problems in wireless signal channel. In order to solve the privacy issues of electronic tags, the most commonly way is to improve algorithms based on Hash function. However, there are some problems that can only play roles in some specific domains. Due to the limitations in various kinds of algorithms, in this paper we put forward a new kind of agreement. When it is required to locate target labels accurately and rapidly in a movement environment, using this agreement can achieve high efficiency through combining the Hash function, the two division search algorithm and CRC check. The results show that this algorithm can accurately identify the tags with merits of low cost, execution rate and anti-attack ability etc.

  18. Automated respiratory therapy system based on the ARDSNet protocol with systemic perfusion control

    Directory of Open Access Journals (Sweden)

    Pomprapa Anake

    2015-09-01

    Full Text Available A medical expert system of automatic artificial ventilation is set up in a star topology with additional closed-loop hemodynamic control. Arterial blood pressure (MAP is controlled by noradrenaline (NA as a controlling variable. The overall patient-in-the-loop expert system can intensively and intelligently perform a long-term treatment based on the Acute Respiratory Distress Syndrome Network (ARDSNet protocol. Three main goals are actively carried out, namely the stabilization and regulation of oxygenation, plateau pressure and blood pH value. The developed system shows a distinctive experimental result based on a 31.5-kg pig, in order to fulfil the ventilatory goals and to ensure proper systemic perfusion. Hence, this system has enormous potentials to realize a commercial system for individual patient with ARDS.

  19. Realization of Intelligent Household Appliance Wireless Monitoring Network Based on LEACH Protocol

    Directory of Open Access Journals (Sweden)

    Weilong ZHOU

    2014-06-01

    Full Text Available The intelligent household appliance wireless monitoring network can real-time monitor the apparent power and power factor of various household appliances in different indoor regions, and can realize the real-time monitoring on the household appliance working status and performance. The household appliance wireless monitoring network based on LEACH protocol is designed in the paper. Firstly, the basic idea of LEACH routing algorithm is proposed. Aiming at the node-distribution feature of intelligent home, the selection of cluster head in the routing algorithm and the data transmission method at the stable communication phase is modified. Moreover, the hardware circuit of power acquisition and power factor measurement is designed. The realization of wireless monitoring network based on CC2530 is described, each module and the whole system were conducted the on-line debugging. Finally, the system is proved to meet the practical requirement through the networking test.

  20. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  1. Quantum private comparison protocol based on the entanglement swapping between χ ^+ state and W-Class state

    Science.gov (United States)

    Xu, Ling; Zhao, Zhiwen

    2017-12-01

    Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.

  2. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    International Nuclear Information System (INIS)

    Li Jian; Song Danjie; Guo Xiaojing; Jing Bo

    2012-01-01

    In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)

  3. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  4. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  5. Uranium enrichment

    International Nuclear Information System (INIS)

    1991-11-01

    This paper analyzes under four different scenarios the adequacy of a $500 million annual deposit into a fund to pay for the cost of cleaning up the Department of Energy's (DOE) three aging uranium enrichment plants. These plants are located in Oak Ridge, Tennessee; Paducah, Kentucky; and Portsmouth, Ohio. In summary the following was found: A fixed annual $500 million deposit made into a cleanup fund would not be adequate to cover total expected cleanup costs, nor would it be adequate to cover expected decontamination and decommissioning (D and D) costs. A $500 million annual deposit indexed to an inflation rate would likely be adequate to pay for all expected cleanup costs, including D and D costs, remedial action, and depleted uranium costs

  6. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  7. Network diffusion-based analysis of high-throughput data for the detection of differentially enriched modules

    Science.gov (United States)

    Bersanelli, Matteo; Mosca, Ettore; Remondini, Daniel; Castellani, Gastone; Milanesi, Luciano

    2016-01-01

    A relation exists between network proximity of molecular entities in interaction networks, functional similarity and association with diseases. The identification of network regions associated with biological functions and pathologies is a major goal in systems biology. We describe a network diffusion-based pipeline for the interpretation of different types of omics in the context of molecular interaction networks. We introduce the network smoothing index, a network-based quantity that allows to jointly quantify the amount of omics information in genes and in their network neighbourhood, using network diffusion to define network proximity. The approach is applicable to both descriptive and inferential statistics calculated on omics data. We also show that network resampling, applied to gene lists ranked by quantities derived from the network smoothing index, indicates the presence of significantly connected genes. As a proof of principle, we identified gene modules enriched in somatic mutations and transcriptional variations observed in samples of prostate adenocarcinoma (PRAD). In line with the local hypothesis, network smoothing index and network resampling underlined the existence of a connected component of genes harbouring molecular alterations in PRAD. PMID:27731320

  8. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  9. Assessing the Efficacy of an App-Based Method of Family Planning: The Dot Study Protocol.

    Science.gov (United States)

    Simmons, Rebecca G; Shattuck, Dominick C; Jennings, Victoria H

    2017-01-18

    assess pregnancy status over time. This paper outlines the protocol for this efficacy trial, following the Standard Protocol Items: Recommendations for Intervention Trials checklist, to provide an overview of the rationale, methodology, and analysis plan. Participants will be asked to provide daily sexual history data and periodically answer surveys administered through a call center or directly on their phone. Funding for the study was provided in 2013 under the United States Agency for International Development Fertility Awareness for Community Transformation project. Recruitment for the study will begin in January of 2017. The study is expected to last approximately 18 months, depending on recruitment. Findings on the study's primary outcomes are expected to be finalized by September 2018. Reproducibility and transparency, important aspects of all research, are particularly critical in developing new approaches to research design. This protocol outlines the first study to prospectively test both the efficacy (correct use) and effectiveness (actual use) of a pregnancy prevention app. This protocol and the processes it describes reflect the dynamic integration of mobile technologies, a call center, and Health Insurance Portability and Accountability Act-compliant study procedures. Future fertility app studies can build on our approaches to develop methodologies that can contribute to the evidence base around app-based methods of contraception. ClinicalTrials.gov NCT02833922; https://clinicaltrials.gov/ct2/show/NCT02833922 (Archived be WebCite at http://www.webcitation.org/6nDkr0e76). ©Rebecca G Simmons, Dominick C Shattuck, Victoria H Jennings. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.01.2017.

  10. Full waveform inversion based on scattering angle enrichment with application to real dataset

    KAUST Repository

    Wu, Zedong

    2015-08-19

    Reflected waveform inversion (RWI) provides a method to reduce the nonlinearity of the standard full waveform inversion (FWI). However, the drawback of the existing RWI methods is inability to utilize diving waves and the extra sensitivity to the migrated image. We propose a combined FWI and RWI optimization problem through dividing the velocity into the background and perturbed components. We optimize both the background and perturbed components, as independent parameters. The new objective function is quadratic with respect to the perturbed component, which will reduce the nonlinearity of the optimization problem. Solving this optimization provides a true amplitude image and utilizes the diving waves to update the velocity of the shallow parts. To insure a proper wavenumber continuation, we use an efficient scattering angle filter to direct the inversion at the early stages to direct energy corresponding to large (smooth velocity) scattering angles to the background velocity update and the small (high wavenumber) scattering angles to the perturbed velocity update. This efficient implementation of the filter is fast and requires less memory than the conventional approach based on extended images. Thus, the new FWI procedure updates the background velocity mainly along the wavepath for both diving and reflected waves in the initial stages. At the same time, it updates the perturbation with mainly reflections (filtering out the diving waves). To demonstrate the capability of this method, we apply it to a real 2D marine dataset.

  11. Functional soy food based on flaxseed and quinoa and enriched with iron and Vitamin B12

    Directory of Open Access Journals (Sweden)

    Ana Carolina Braga

    2015-07-01

    Full Text Available A diet rich in food derived from vegetables reduces the risk of developing chronic and degenerative diseases and provides the essential nutrients for human consumption. Besides soybean, other foods of vegetal origin have been studied and incorporated in healthy formulations, such as quinoa and linseed. Current assay comprises a sensorial analysis of a product of vegetable origin, a soy product, based on quinoa and flaxseed, considered to be functional food, for its organoleptic characteristics acceptable by a sample group of 80 individuals. Several tests were conducted to reach an adequate formulation for the product, characterized by 11.1 g of protein content, 9.6 g of dietary fiber and low levels of lipids, since it had only 1.4 g. The resulting product revealed adequate microbiological conditions when subjected to microbiological analysis (coliforms at 45ºC; coliforms at 35ºC and Staphylococcus aureus. According to scores in the sensory analysis, it may be assumed that the product was accepted by the sample group. The favorable results indicate the possibility of consumers adhering to a processed diet rich in food derived from vegetables, with functional properties, to replace animal-derived food which is rich in saturated fats and low in fiber.

  12. A Routing Protocol Based on Received Signal Strength for Underwater Wireless Sensor Networks (UWSNs

    Directory of Open Access Journals (Sweden)

    Meiju Li

    2017-11-01

    Full Text Available Underwater wireless sensor networks (UWSNs are featured by long propagation delay, limited energy, narrow bandwidth, high BER (Bit Error Rate and variable topology structure. These features make it very difficult to design a short delay and high energy-efficiency routing protocol for UWSNs. In this paper, a routing protocol independent of location information is proposed based on received signal strength (RSS, which is called RRSS. In RRSS, a sensor node firstly establishes a vector from the node to a sink node; the length of the vector indicates the RSS of the beacon signal (RSSB from the sink node. A node selects the next-hop along the vector according to RSSB and the RSS of a hello packet (RSSH. The node nearer to the vector has higher priority to be a candidate next-hop. To avoid data packets being delivered to the neighbor nodes in a void area, a void-avoiding algorithm is introduced. In addition, residual energy is considered when selecting the next-hop. Meanwhile, we establish mathematic models to analyze the robustness and energy efficiency of RRSS. Lastly, we conduct extensive simulations, and the simulation results show RRSS can save energy consumption and decrease end-to-end delay.

  13. Interfaces and Communication Protocols in ATCA-Based LLRF Control Systems

    Science.gov (United States)

    Makowski, Dariusz; Koprek, Waldemar; Jezynski, Tomasz; Piotrowski, Adam; Jablonski, Grzegorz; Jalmuzna, Wojciech; Simrock, Stefan

    2009-10-01

    Linear accelerators driving Free Electron Lasers (FELs), such as the Free Electron Laser in Hamburg (FLASH) or the X-ray Free Electron Laser (XFEL), require sophisticated Low Level Radio Frequency (LLRF) control systems. The controller of the LLRF system should stabilize the phase and amplitude of the field in accelerating modules below 0.02% of the amplitude and 0.01 degree for phase tolerances to produce an ultra stable electron beam that meets the required conditions for Self-Amplified Spontaneous Emission (SASE). Since the LLRF system for the XFEL must be in operation for the next 20 years, it should be reliable, reproducible and upgradeable. Having in mind all requirements of the LLRF control system, the Advanced Telecommunications Computing Architecture (ATCA) has been chosen to build a prototype of the LLRF system for the FLASH accelerator that is able to supervise 32 cavities of one RF station. The LLRF controller takes advantage of features offered by the ATCA standard. The LLRF system consists of a few ATCA carrier blades, Rear Transition Modules (RTM) and several Advanced Mezzanine Cards (AMCs) that provide all necessary digital and analog hardware components. The distributed hardware of the LLRF system requires a number of communication links that should provide different latencies, bandwidths and protocols. The paper presents the general view of the ATC A-based LLRF system, discusses requirements and proposes an application for various interfaces and protocols in the distributed LLRF control system.

  14. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  15. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  16. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Science.gov (United States)

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  17. Experimental protocol to assess the tourism vehicles accessibility based on heart rate and access time measurements

    Energy Technology Data Exchange (ETDEWEB)

    Alcala Fazio, E.; Alvarez Fernandez, N.

    2016-07-01

    The objective of the Project is to define an experimental protocol for the accessibility assessment of the transport vehicles, by analysing the evolution of the effort and time variables consumed by a target group –Persons of Reduced Mobility (PMRs). This protocol consisted in tests of accessibility on a sample of 6 passenger cars (class M1) by 8 elderly people carrying a heart rate monitor, and whose access manoeuvres were recorded by video cameras. Based on the Hilloskorpi et al. [1] model and by developing a method of truncation of the heart rate (HR) tests records - eliminating the component of the work biologically needed by the organism to keep its basal metabolic rate from the work each person performed – it was possible to evaluate how much energy each individual invested in each access manoeuver. Immediately after each test, and after the whole round of vehicles, each participant was surveyed for a subjective assessment of the difficulty of accessing to the cars. According to each of the above results, the HR objective measurements and the subjective opinion about the ease of access experienced by each individual, the vehicles were ranked by order of accessibility to the front and rear seats. The result of both rankings showed the orders of the similar vehicles, the potential of the method and a fair closeness between its results and the subjective, but real and unequivocal, judgments of the participants. (Author)

  18. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  19. Comparison of carboplatin and doxorubicin-based chemotherapy protocols in 470 dogs after amputation for treatment of appendicular osteosarcoma.

    Science.gov (United States)

    Selmic, L E; Burton, J H; Thamm, D H; Withrow, S J; Lana, S E

    2014-01-01

    Many chemotherapy protocols have been reported for treatment of canine appendicular osteosarcoma (OSA), but outcome comparisons in a single population are lacking. To evaluate the effects of protocol and dose intensity (DI) on treatment outcomes for carboplatin and doxorubicin-based chemotherapy protocols. Four hundred and seventy dogs with appendicular OSA. A retrospective cohort study was performed comprising consecutive dogs treated (1997-2012) with amputation followed by 1 of 5 chemotherapy protocols: carboplatin 300 mg/m(2) IV q21d for 4 or 6 cycles (CARBO6), doxorubicin 30 mg/m(2) IV q14d or q21d for 5 cycles, and alternating carboplatin 300 mg/m(2) IV and doxorubicin 30 mg/m(2) IV q21d for 3 cycles. Adverse events (AE) and DI were evaluated. Kaplan-Meier survival curves and Cox proportional hazards regression were used to compare disease-free interval (DFI) and survival time (ST) among protocols. The overall median DFI and ST were 291 days and 284 days, respectively. A lower proportion of dogs prescribed CARBO6 experienced AEs compared to other protocols (48.4% versus 60.8-75.8%; P = .001). DI was not associated with development of metastases or death. After adjustment for baseline characteristics and prognostic factors, none of the protocols provided a significant reduction in risk of development of metastases or death. Although choice of protocol did not result in significant differences in DFI or ST, the CARBO6 protocol resulted in a lower proportion of dogs experiencing AEs, which could be advantageous in maintaining high quality of life during treatment. DI was not a prognostic indicator in this study. Copyright © 2014 by the American College of Veterinary Internal Medicine.

  20. History and Nature of Science enriched Problem-Based Learning on the origins of biodiversity and of continents and oceans

    Directory of Open Access Journals (Sweden)

    Cristina Sousa

    2014-09-01

    Full Text Available The episode of the History of Science (HOS on the theory of continental drift proposed by Alfred Wegener has been considered an excellent example for teaching students aspects of Nature of Science (NOS and the relation of Science with social and tecnological contexts. We implemented a NOS and HOS-enriched Problem-Based Learning environment at the middle (year 7 of the Portuguese National Curriculum and secondary level (year 10 for teaching the origins of biodiversity and of continents and oceans (mobilism.  The goal of providing detailed implementation practices is to adress the lack of how to in Problem-based learning (PBL implementation in classrooms for 12 to 16 year old students and is the first practical example of implementation using this episode of HOS for teaching geological mobilism integrated with evolution. Therefore, in this study, we provide specific suggestions for supporting teachers’ classroom efforts in implementing PBL, such as scaffolding. The ill-problem presented to students, without a single correct answer, was based on the phylogeny of extant and extinct ratite birds, described by Charles Darwin and the present geographical distribution. The evaluation of the students was focused on the chain of reasoning employed, and we performed a comparisation analysis of the problem’s solution presented by the students of both classes regarding the explanation of the phylogeny of ratites based on geological mobilism. We observed an overall improvement (25-77% of the percentages of students pre- and post-instruction adequate answers; therefore our PBL strategy was efficient.

  1. Using salivary cortisol to measure the effects of a Wilbarger protocol-based procedure on sympathetic arousal: a pilot study.

    Science.gov (United States)

    Kimball, Judith G; Lynch, Keara M; Stewart, Kelli C; Williams, Nicole E; Thomas, Meghan A; Atwood, Kam D

    2007-01-01

    This study investigated changes in salivary cortisol, the stress hormone, after administration of a procedure based on the Wilbarger protocol to children diagnosed with sensory defensiveness (SD), a type of sensory modulation dysfunction. Using a single-subject design across participants, we studied 4 boys with SD ages 3 to 5 years. Each participant completed four sessions consisting of the collection of a saliva sample, administration of a procedure based on the Wilbarger protocol, 15 min of quiet neutral activities to allow time for any changes in cortisol level to manifest in the saliva, and the second collection of saliva. Saliva samples were analyzed using enzyme-linked immunosorbent assay (ELISA). Salivary cortisol levels in all participants changed after each of four applications of a procedure based on the Wilbarger protocol. The cortisol levels of 2 children whose levels were relatively higher on pretest decreased at each posttest. The levels of 1 child whose cortisol was higher on pretest three times decreased those three times and increased the one time the pretest cortisol was lower. The levels of 1 child who had the lowest cortisol levels of any of the children increased each time. Therefore, in all participants, cortisol moved in the direction of modulation. In these 4 boys, a procedure based on the Wilbarger protocol modulated cortisol levels toward a middle range. This pilot study indicates that there is an association between sympathetic nervous system response and the Wilbarger protocol-based procedure, as indicated by salivary cortisol levels.

  2. Integrated and Contextual Basic Science Instruction in Preclinical Education: Problem-Based Learning Experience Enriched with Brain/Mind Learning Principles

    Science.gov (United States)

    Gülpinar, Mehmet Ali; Isoglu-Alkaç, Ümmühan; Yegen, Berrak Çaglayan

    2015-01-01

    Recently, integrated and contextual learning models such as problem-based learning (PBL) and brain/mind learning (BML) have become prominent. The present study aimed to develop and evaluate a PBL program enriched with BML principles. In this study, participants were 295 first-year medical students. The study used both quantitative and qualitative…

  3. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  4. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC protocol

    Directory of Open Access Journals (Sweden)

    Chen Dafang

    2007-09-01

    Full Text Available Abstract Background The exact etiology of ischemic stroke remains unclear, because multiple genetic predispositions and environmental risk factors may be involved, and their interactions dictate the complexity. Family-based studies provide unique features in design, while they are currently underrepresented for studies of ischemic stroke in developing countries. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC program aims to conduct a genetic pedigree study of ischemic stroke in rural communities of China. Methods/Design The pedigrees of ischemic stroke with clear documentation are recruited by using the proband-initiated contact method, based on the stroke registry in hospital and communities. Blood samples and detailed information of pedigrees are collected through the health care network in the rural area, and prospective follow-up of the pedigrees cohort is scheduled. Complementary strategies of both family-based design and matched case-spousal control design are used, and comprehensive statistical methods will be implemented to ascertain potential complex genetic and environmental factors and their interactions as well. Discussion This study is complementary to other genetic pedigree studies of ischemic stroke, such as the Siblings With Ischemic Stroke Study (SWISS, which are established in developed countries. We describe the protocol of this family-based genetic epidemiological study that may be used as a new practical guideline and research paradigm in developing countries and facilitate initiatives of stroke study for international collaborations.

  5. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ayman Tajeddine

    2015-02-01

    Full Text Available In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN. CENTERA utilizes the more powerful base station (BS to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes’ battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node’s bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  6. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †

    Science.gov (United States)

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-01-01

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712

  7. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.

    Science.gov (United States)

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-02-02

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  8. Family, employment, and individual resource-based antecedents of maternal work-family enrichment from infancy through middle childhood.

    Science.gov (United States)

    Zhou, Nan; Buehler, Cheryl

    2016-07-01

    This study used data from the National Institute of Child Health and Human Development (NICHD) Study of Early Child Care and Youth Development (N = 1,019) to examine family, employment, and individual antecedents of maternal work-family enrichment from infancy through middle childhood. Work-family conflict and important confounding factors were controlled. From the family domain, higher income-to-needs ratio and social support were associated with higher work-family enrichment. From the employment domain, greater job rewards, benefits of employment for children, and work commitment were associated with higher work-family enrichment. From the individual domain, higher maternal education and extroversion were associated with higher work-family enrichment. No family, employment, and individual characteristics were associated with work-family conflict across time except for partner intimacy. In general, the results supported antecedents of work-family enrichment that supply needed resources. The present study contributed to the literature by identifying antecedents of maternal work-family enrichment across early child developmental stages, which goes beyond examinations of particular life stages and a work-family conflict perspective. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. Family, Employment, and Individual Resource-Based Antecedents of Maternal Work-Family Enrichment from Infancy through Middle Childhood

    Science.gov (United States)

    Zhou, Nan; Buehler, Cheryl

    2015-01-01

    This study used data from the NICHD Study of Early Child Care and Youth Development (N = 1,019) to examine family, employment, and individual antecedents of maternal work-family enrichment from infancy through middle childhood. Work-family conflict and important confounding factors were controlled. From the family domain, higher income-to-needs ratio and social support were associated with higher work-family enrichment. From the employment domain, greater job rewards, benefits of employment for children, and work commitment were associated with higher work-family enrichment. From the individual domain, higher maternal education and extroversion were associated with higher work-family enrichment. No family, employment, and individual characteristics were associated with work-family conflict across time except for partner intimacy. In general, the results supported antecedents of work-family enrichment that supply needed resources. The present study contributed to the literature by identifying antecedents of maternal work-family enrichment across early child developmental stages, which goes beyond examinations of particular life stages and a work-family conflict perspective. Implications for theory and practice are discussed. PMID:26641483

  10. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    Science.gov (United States)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  11. Comprehensive Protocols for CRISPR/Cas9-based Gene Editing in Human Pluripotent Stem Cells.

    Science.gov (United States)

    Santos, David P; Kiskinis, Evangelos; Eggan, Kevin; Merkle, Florian T

    2016-08-17

    Genome editing of human pluripotent stem cells (hPSCs) with the CRISPR/Cas9 system has the potential to revolutionize hPSC-based disease modeling, drug screening, and transplantation therapy. Here, we aim to provide a single resource to enable groups, even those with limited experience with hPSC culture or the CRISPR/Cas9 system, to successfully perform genome editing. The methods are presented in detail and are supported by a theoretical framework to allow for the incorporation of inevitable improvements in the rapidly evolving gene-editing field. We describe protocols to generate hPSC lines with gene-specific knock-outs, small targeted mutations, or knock-in reporters. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  12. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Science.gov (United States)

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. PMID:22163845

  13. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Directory of Open Access Journals (Sweden)

    Tai-Hoon Kim

    2011-04-01

    Full Text Available People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors.

  14. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  15. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  16. Remote upgrade and control system of NAT crossing based on mail protocol

    Directory of Open Access Journals (Sweden)

    Chen Lei

    2017-02-01

    Full Text Available This paper proposes a new scheme which uses transmits information such as related IP address and port by the mail server POP3 and SMTP protocol to realize net address turning (NAT crossing.The UDP connection between client and device node is realized by using "burrow" technology.Compared to the scheme that uses procedure server to realize NAT crossing schemes by the "burrow" technology,our scheme has advantages of saving operating costs,improving the stability of the system and enhancing the transferability of the system.With multiple equipment node,and a variety of network environment,we introduces the firmware update module,designs and realizes the remote upgrade and the control system of an intelligent device of Internet of Things based on the proposed scheme,and discusses the robustness of the system.

  17. Functional connectivity decreases in autism in emotion, self, and face circuits identified by Knowledge-based Enrichment Analysis.

    Science.gov (United States)

    Cheng, Wei; Rolls, Edmund T; Zhang, Jie; Sheng, Wenbo; Ma, Liang; Wan, Lin; Luo, Qiang; Feng, Jianfeng

    2017-03-01

    A powerful new method is described called Knowledge based functional connectivity Enrichment Analysis (KEA) for interpreting resting state functional connectivity, using circuits that are functionally identified using search terms with the Neurosynth database. The method derives its power by focusing on neural circuits, sets of brain regions that share a common biological function, instead of trying to interpret single functional connectivity links. This provides a novel way of investigating how task- or function-related networks have resting state functional connectivity differences in different psychiatric states, provides a new way to bridge the gap between task and resting-state functional networks, and potentially helps to identify brain networks that might be treated. The method was applied to interpreting functional connectivity differences in autism. Functional connectivity decreases at the network circuit level in 394 patients with autism compared with 473 controls were found in networks involving the orbitofrontal cortex, anterior cingulate cortex, middle temporal gyrus cortex, and the precuneus, in networks that are implicated in the sense of self, face processing, and theory of mind. The decreases were correlated with symptom severity. Copyright © 2017. Published by Elsevier Inc.

  18. Centrifuge enrichment program

    International Nuclear Information System (INIS)

    Astley, E.R.

    1976-01-01

    Exxon Nuclear has been active in privately funded research and development of centrifuge enrichment technology since 1972. In October of 1975, Exxon Nuclear submitted a proposal to design, construct, and operate a 3000-MT SWU/yr centrifuge enrichment plant, under the provisions of the proposed Nuclear Fuel Assurance Act of 1975. The U.S. Energy Research and Development Administration (ERDA) accepted the proposal as a basis for negotiation. It was proposed to build a 1000-MT SWU/yr demonstration increment to be operational in 1982; and after successful operation for about one year, expand the facilities into a 3000-MT SWU/yr plant. As part of the overall centrifuge enrichment plant, a dedicated centrifuge manufacturing plant would be constructed; sized to support the full 3000-MT SWU/yr plant. The selection of the centrifuge process by Exxon Nuclear was based on an extremely thorough evaluation of current and projected enrichment technology; results show that the technology is mature and the process will be cost effective. The substantial savings in energy (about 93%) from utilization of the centrifuge option rather than gaseous diffusion is a compelling argument. As part of this program, Exxon Nuclear has a large hardware R and D program, plus a prototype centrifuge manufacturing capability in Malta, New York. To provide a full-scale machine and limited cascade test capability, Exxon Nuclear is constructing a $4,000,000 Centrifuge Test Facility in Richland, Washington. This facility was to initiate operations in the Fall of 1976. Exxon Nuclear is convinced that the centrifuge enrichment process is the rational selection for emergence of a commercial enrichment industry

  19. Interprofessional primary care protocols: a strategy to promote an evidence-based approach to teamwork and the delivery of care.

    Science.gov (United States)

    Goldman, Joanne; Meuser, Jamie; Lawrie, Lynne; Rogers, Jess; Reeves, Scott

    2010-11-01

    Primary care reform involving interprofessional team-based care is a global phenomenon. In Ontario, Canada, 150 Family Health Teams (FHTs) have been approved in the past few years. The transition to a FHT is complex involving many changes and the processes for collaborative teamwork are not clearly delineated. To support the transition to team-based care in FHTs, a project was undertaken to develop and implement a series of interprofessional protocols in four clinical areas. These interprofessional protocols would contain relevant and evidence-based resources to support both a team and evidence-based approach to care. This paper reports on a qualitative study to examine the process of interprofessional protocol development and pilot implementation. Adopting an exploratory case study approach (Robson, 2002 ), 36 interviews were conducted with health professionals and community group members who participated in the creation and piloting of the protocols, and with project managers. In addition, observational and documentary data were gathered on the protocol development and implementation processes. The findings from the protocol development stage demonstrate the value of the focus on evidence and team, the process of assessing and targeting FHT needs, inter-organizational and interprofessional sharing, the importance of facilitation and support, and expectations for implementation. The findings from the pilot implementation stage report on the importance of champions and leaders, the implementation strategies used, FHT and organizational factors affecting implementation, and outcomes achieved. Findings are discussed in relation to the knowledge translation and interprofessional literature. Research is ongoing to examine the effectiveness of dissemination of the protocols to FHTs across the province of Ontario and its impact on health care outcomes.

  20. Digestion and ruminal fermentation of cocoa pod silage based ration enriched by gliricidia and calliandra leaves on goats

    Directory of Open Access Journals (Sweden)

    Puastuti W

    2015-03-01

    Full Text Available In term of availability, cacao pod is potential for ruminant feed. According to its nutrients content, cacao pod can be used as feed fiber source. Protein sources materials must be added when cacao pod was ensilaged due to low protein content of this material. The aim of this study was to investigate digestibility value and end products of rumen fermentation of goat fed grass or cacao pod based ration. Randomized block design and 20 heads of lambs (16.95±2.36 kg to evaluated 5 type of rations: R (50% grass + 50% concentrate; S (50% cacao pod silage + 50% concentrate; SG (50% cacao pod-gliricidia silage + 50% concentrate; SK (50% cacao pod-calliandra silage + 50% concentrate dan SC (50% cacao pod-mixture of gliricidia-calliandra silage + 50% concentrate. Feeding trial was conducted for over 15 weeks. Measurements were taken on feed digestibility and rumen-fermentation end-products after 3 weeks of treatments. Results shows that nutrients digestibility was different significantly among the groups of treatments (P<0.05. Digestibillity of organic matter, NDF and energy of R ration was those of higher significantly (P<0.05 than those of other groups. N-ammonia of rumen from goat feed R ration was higher (P<0.05 than other groups. Total VFA and each component were different among the groups (P<0.05, however the value was similar among the groups of cacao pod silage rations. It is concluded that cacao pod silaged based rations enriched by Gliricidia and Calliandra leaves did not produce similar digestibility value and end products of rumen fermentation with grass based ration.

  1. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  2. Implementation of the Welfare Quality broiler assessment protocol – final report : overview of outcome-based measurement of broiler welfare and a general discussion on the Welfare Quality broiler assessment protocol

    NARCIS (Netherlands)

    Jong, de I.C.; Gunnink, H.; Hindle, V.A.

    2015-01-01

    In the current report, two topics related to our study on the implementation of the Welfare Quality® broiler assessment protocol are discussed. First, animal-based measures for broiler welfare, currently included in the Welfare Quality® broiler assessment protocol, are discussed with respect to

  3. Base station MAC with APRMA protocol for broadband multimedia ATM in micro/pico-cellular mobile networks

    DEFF Research Database (Denmark)

    Le, Khanh Hoang; Nielsen, Søren Nørskov; Dittmann, Lars

    1998-01-01

    The concept for a wireless ATM access system that enables seamless mobile connectivity to the B-ISDN is presented. It is based on small, low cost and intelligent base stations running a medium access control (MAC) protocol using adaptive packet reservation multiple access (APRMA). Both...

  4. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  5. Three-dimensional ordered titanium dioxide-zirconium dioxide film-based microfluidic device for efficient on-chip phosphopeptide enrichment.

    Science.gov (United States)

    Zhao, De; He, Zhongyuan; Wang, Gang; Wang, Hongzhi; Zhang, Qinghong; Li, Yaogang

    2016-09-15

    Microfluidic technology plays a significant role in separating biomolecules, because of its miniaturization, integration, and automation. Introducing micro/nanostructured functional materials can improve the properties of microfluidic devices, and extend their application. Inverse opal has a three-dimensional ordered net-like structure. It possesses a large surface area and exhibits good mass transport, making it a good candidate for bio-separation. This study exploits inverse opal titanium dioxide-zirconium dioxide films for on-chip phosphopeptide enrichment. Titanium dioxide-zirconium dioxide inverse opal film-based microfluidic devices were constructed from templates of 270-, 340-, and 370-nm-diameter poly(methylmethacrylate) spheres. The phosphopeptide enrichments of these devices were determined by matrix-assisted laser desorption/ionization time-of-flight (MALDI-TOF) mass spectrometry. The device constructed from the 270-nm-diameter sphere template exhibited good comprehensive phosphopeptide enrichment, and was the best among these three devices. Because the size of opal template used in construction was the smallest, the inverse opal film therefore had the smallest pore sizes and the largest surface area. Enrichment by this device was also better than those of similar devices based on nanoparticle films and single component films. The titanium dioxide-zirconium dioxide inverse opal film-based device provides a promising approach for the efficient separation of various biomolecules. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    OpenAIRE

    Zhang, Liping; Tang, Shanyu; Zhu, Shaohui

    2016-01-01

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from t...

  7. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  8. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...

  9. SDL-Based Protocol Validation for the Integrated Safety Communication Network in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Jung-hun; Kim, Dong-hoon; Lee, Dong-young; Park, Sung-woo

    2006-01-01

    The communication protocol in nuclear power plants needs to be validated systematically to avoid the critical situation that may be caused by its own faults. We establish the methodology to validate the protocol designed for the Integrated Safety Communication Networks (ISCN) of Korea Nuclear Instrumentation and Control System (KNICS). The ISCN protocol is specified using the formal description technique called the SDL. The validation of ISCN protocol is done via the Simulator and Validator, both of which are main functions provided by the SDL

  10. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  11. ADAPTIVE CLUSTER BASED ROUTING PROTOCOL WITH ANT COLONY OPTIMIZATION FOR MOBILE AD-HOC NETWORK IN DISASTER AREA

    Directory of Open Access Journals (Sweden)

    Enrico Budianto

    2012-07-01

    Full Text Available In post-disaster rehabilitation efforts, the availability of telecommunication facilities takes important role. However, the process to improve telecommunication facilities in disaster area is risky if it is done by humans. Therefore, a network method that can work efficiently, effectively, and capable to reach the widest possible area is needed. This research introduces a cluster-based routing protocol named Adaptive Cluster Based Routing Protocol (ACBRP equipped by Ant Colony Optimization method, and its implementation in a simulator developed by author. After data analysis and statistical tests, it can be concluded that routing protocol ACBRP performs better than AODV and DSR routing protocol. Pada upaya rehabilitasi pascabencana, ketersediaan fasilitas telekomunikasi memiliki peranan yang sangat penting. Namun, proses untuk memperbaiki fasilitas telekomunikasi di daerah bencana memiliki resiko jika dilakukan oleh manusia. Oleh karena itu, metode jaringan yang dapat bekerja secara efisien, efektif, dan mampu mencapai area seluas mungkin diperlukan. Penelitian ini memperkenalkan sebuah protokol routing berbasis klaster bernama Adaptive Cluster Based Routing Protocol (ACBRP, yang dilengkapi dengan metode Ant Colony Optimization, dan diimplementasikan pada simulator yang dikembangkan penulis. Setelah data dianalisis dan dilakukan uji statistik, disimpulkan bahwa protokol routing ACBRP beroperasi lebih baik daripada protokol routing AODV maupun DSR.

  12. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    Science.gov (United States)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  13. Optimizing the multimodal approach to pancreatic cyst fluid diagnosis: developing a volume-based triage protocol.

    Science.gov (United States)

    Chai, Siaw Ming; Herba, Karl; Kumarasinghe, M Priyanthi; de Boer, W Bastiaan; Amanuel, Benhur; Grieu-Iacopetta, Fabienne; Lim, Ee Mun; Segarajasingam, Dev; Yusoff, Ian; Choo, Chris; Frost, Felicity

    2013-02-01

    The objective of this study was to develop a triage algorithm to optimize diagnostic yield from cytology, carcinoembryonic antigen (CEA), and v-Ki-ras2 Kirsten rat sarcoma viral oncogene homolog (KRAS) testing on different components of a single pancreatic cyst fluid specimen. The authors also sought to determine whether cell block supernatant was suitable for CEA and KRAS testing. Fifty-four pancreatic cysts were triaged according to a volume-dependent protocol to generate fluid (neat and supernatant) and cell block specimens for cytology, comparative CEA, and KRAS testing. Follow-up histology, diagnostic cytology, or a combined clinicopathologic interpretation was recorded as the final diagnosis. There were 26 mucinous cystic lesions and 28 nonmucinous cystic lesions with volumes ranging from 0.3 mL to 55 mL. Testing different components of the specimens (cell block, neat, and/or supernatant) enabled all laboratory investigations to be performed on 50 of 54 cyst fluids (92.6%). Interpretive concordance was observed in 17 of 17 cases (100%) and in 35 of 40 cases (87.5%) that had multiple components tested for CEA and KRAS mutations, respectively. An elevated CEA level (>192 ng/mL) was the most sensitive test for the detection of a mucinous cystic lesion (62.5%) versus KRAS mutation (56%) and "positive" cytology (61.5%). KRAS mutations were identified in 2 of 25 mucinous cystic lesions (8%) in which cytology and CEA levels were not contributory. A volume-based protocol using different components of the specimen was able to optimize diagnostic yield in pancreatic cyst fluids. KRAS mutation testing increased diagnostic yield when combined with cytology and CEA analysis. The current results demonstrated that supernatant is comparable to neat fluid and cell block material for CEA and KRAS testing. Copyright © 2012 American Cancer Society.

  14. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    Science.gov (United States)

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  15. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    Science.gov (United States)

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.

  16. Modified calibration protocol evaluated in a model-based testing of SBR flexibility

    DEFF Research Database (Denmark)

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià

    2011-01-01

    The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provide...

  17. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus

  18. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

    Science.gov (United States)

    Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun

    2014-04-01

    Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.

  19. Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network

    Science.gov (United States)

    Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.

    2017-06-01

    Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.

  20. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  1. Preparation of Microkernel-Based Mesoporous (SiO2-CdTe-SiO2)@SiO2 Fluorescent Nanoparticles for Imaging Screening and Enrichment of Heat Shock Protein 90 Inhibitors from Tripterygium Wilfordii.

    Science.gov (United States)

    Hu, Yue; Miao, Zhao-Yi; Zhang, Xiao-Jing; Yang, Xiao-Tong; Tang, Ying-Ying; Yu, Sheng; Shan, Chen-Xiao; Wen, Hong-Mei; Zhu, Dong

    2018-05-01

    The currently utilized ligand fishing for bioactive molecular screening from complex matrixes cannot perform imaging screening. Here, we developed a new solid-phase ligand fishing coupled with an in situ imaging protocol for the specific enrichment and identification of heat shock protein 90 (Hsp 90) inhibitors from Tripterygium wilfordii, utilizing a multiple-layer and microkernel-based mesoporous nanostructure composed of a protective silica coating CdTe quantum dot (QD) core and a mesoporous silica shell, i.e., microkernel-based mesoporous (SiO 2 -CdTe-SiO 2 )@SiO 2 fluorescent nanoparticles (MMFNPs) as extracting carries and fluorescent probes. The prepared MMFNPs showed a highly uniform spherical morphology, retention of fluorescence emission, and great chemical stability. The fished ligands by Hsp 90α-MMFNPs were evaluated via the preliminary bioactivity based on real-time cellular morphology imaging by confocal laser scanning microscopy (CLSM) and then identified by mass spectrometry (MS). Celastrol was successfully isolated as an Hsp 90 inhibitor, and two other specific components screened by Hsp 90α-MMFNPs, i.e., demecolcine and wilforine, were preliminarily identified as potential Hsp 90 inhibitors through the verification of strong affinity to Hsp 90 and antitumor bioactivity. The approach based on the MMFNPs provides a strong platform for imaging screening and discovery of plant-derived biologically active molecules with high efficiency and selectivity.

  2. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  3. The protocols for the 10/66 dementia research group population-based research programme.

    Science.gov (United States)

    Prince, Martin; Ferri, Cleusa P; Acosta, Daisy; Albanese, Emiliano; Arizaga, Raul; Dewey, Michael; Gavrilova, Svetlana I; Guerra, Mariella; Huang, Yueqin; Jacob, K S; Krishnamoorthy, E S; McKeigue, Paul; Rodriguez, Juan Llibre; Salas, Aquiles; Sosa, Ana Luisa; Sousa, Renata M M; Stewart, Robert; Uwakwe, Richard

    2007-07-20

    Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina), with a sample size of between 1000 and 3000 (generally 2000). Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain). Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815). A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina) to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our aim is to create an evidence base to empower advocacy, raise

  4. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aboobeker Sidhik Koyamparambil Mammu

    2015-04-01

    Full Text Available Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs. One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs and a cluster head (CH. The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH and hybrid energy-efficient distributed clustering (HEED.

  5. An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Hosen, A S M Sanwar; Cho, Gi Hwan

    2018-05-11

    Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head's role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks' information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime.

  6. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  7. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    Science.gov (United States)

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, pwaste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to

  8. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  9. Juvenile psittacine environmental enrichment.

    Science.gov (United States)

    Simone-Freilicher, Elisabeth; Rupley, Agnes E

    2015-05-01

    Environmental enrichment is of great import to the emotional, intellectual, and physical development of the juvenile psittacine and their success in the human home environment. Five major types of enrichment include social, occupational, physical, sensory, and nutritional. Occupational enrichment includes exercise and psychological enrichment. Physical enrichment includes the cage and accessories and the external home environment. Sensory enrichment may be visual, auditory, tactile, olfactory, or taste oriented. Nutritional enrichment includes variations in appearance, type, and frequency of diet, and treats, novelty, and foraging. Two phases of the preadult period deserve special enrichment considerations: the development of autonomy and puberty. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. Detecting child abuse based on parental characteristics: Does The Hague Protocol cause parents to avoid the Emergency Department?

    NARCIS (Netherlands)

    Diderich, H.M.; Fekkes, M.; Dechesne, M.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    Objectives: The Hague Protocol is used by professionals at the adult Emergency Departments (ED) in The Netherlands to detect child abuse based on three parental characteristics: (1) domestic violence, (2) substance abuse or (3) suicide attempt or self-harm. After detection, a referral is made to the

  11. RT-based memory detection : Item saliency effects in the single-probe and the multiple-probe protocol

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.; Theocharidou, K.

    RT-based memory detection may provide an efficient means to assess recognition of concealed information. There is, however, considerable heterogeneity in detection rates, and we explored two potential moderators: item saliency and test protocol. Participants tried to conceal low salient (e.g.,

  12. Injectable self-gelling composites for bone tissue engineering based on gellan gum hydrogel enriched with different bioglasses

    NARCIS (Netherlands)

    Douglas, T.E.; Piwowarczyk, W.; Pamula, E.; Liskova, J.; Schaubroeck, D.; Leeuwenburgh, S.C.; Brackman, G.; Balcaen, L.; Detsch, R.; Declercq, H.; Cholewa-Kowalska, K.; Dokupil, A.; Cuijpers, V.M.; Vanhaecke, F.; Cornelissen, R.; Coenye, T.; Boccaccini, A.R.; Dubruel, P.

    2014-01-01

    Hydrogels of biocompatible calcium-crosslinkable polysaccharide gellan gum (GG) were enriched with bioglass particles to enhance (i) mineralization with calcium phosphate (CaP); (ii) antibacterial properties and (iii) growth of bone-forming cells for future bone regeneration applications. Three

  13. The Multiple Intelligence Based Enrichment Module on the Development of Human Potential: Examining Its Impact and the Views of Teachers

    Science.gov (United States)

    Azid, Nurulwahida Hj; Yaacob, Aizan; Shaik-Abdullah, Sarimah

    2016-01-01

    Purpose: Howard Gardners' concept of multiple intelligence (MI) offers an alternative perspective on intelligence which highlights the importance of acknowledging learner diversity, individual talents and the development of human potentials. MI has been used as a basis for the construction of modular enrichment activities to facilitate the…

  14. Real-time pathogen monitoring during enrichment: a novel nanotechnology-based approach to food safety testing.

    Science.gov (United States)

    Weidemaier, Kristin; Carruthers, Erin; Curry, Adam; Kuroda, Melody; Fallows, Eric; Thomas, Joseph; Sherman, Douglas; Muldoon, Mark

    2015-04-02

    We describe a new approach for the real-time detection and identification of pathogens in food and environmental samples undergoing culture. Surface Enhanced Raman Scattering (SERS) nanoparticles are combined with a novel homogeneous immunoassay to allow sensitive detection of pathogens in complex samples such as stomached food without the need for wash steps or extensive sample preparation. SERS-labeled immunoassay reagents are present in the cultural enrichment vessel, and the signal is monitored real-time through the wall of the vessel while culture is ongoing. This continuous monitoring of pathogen load throughout the enrichment process enables rapid, hands-free detection of food pathogens. Furthermore, the integration of the food pathogen immunoassay directly into the enrichment vessel enables fully biocontained food safety testing, thereby significantly reducing the risk of contaminating the surrounding environment with enriched pathogens. Here, we present experimental results showing the detection of E. coli, Salmonella, or Listeria in several matrices (raw ground beef, raw ground poultry, chocolate milk, tuna salad, spinach, brie cheese, hot dogs, deli turkey, orange juice, cola, and swabs and sponges used to sample a stainless steel surface) using the SERS system and demonstrate the accuracy of the approach compared to plating results. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. Application and comparison of large-scale solution-based DNA capture-enrichment methods on ancient DNA

    DEFF Research Database (Denmark)

    Avila Arcos, Maria del Carmen; Cappellini, Enrico; Romero-Navarro, J. Alberto

    2011-01-01

    The development of second-generation sequencing technologies has greatly benefitted the field of ancient DNA (aDNA). Its application can be further exploited by the use of targeted capture-enrichment methods to overcome restrictions posed by low endogenous and contaminating DNA in ancient samples...

  16. Gene-Based Analysis of Regionally Enriched Cortical Genes in GWAS Data Sets of Cognitive Traits and Psychiatric Disorders

    DEFF Research Database (Denmark)

    Ersland, Kari M; Christoforou, Andrea; Stansberg, Christine

    2012-01-01

    the regionally enriched cortical genes to mine a genome-wide association study (GWAS) of the Norwegian Cognitive NeuroGenetics (NCNG) sample of healthy adults for association to nine psychometric tests measures. In addition, we explored GWAS data sets for the serious psychiatric disorders schizophrenia (SCZ) (n...

  17. Effective Enrichment and Detection of Trace Polycyclic Aromatic Hydrocarbons in Food Samples based on Magnetic Covalent Organic Framework Hybrid Microspheres.

    Science.gov (United States)

    Li, Ning; Wu, Di; Hu, Na; Fan, Guangsen; Li, Xiuting; Sun, Jing; Chen, Xuefeng; Suo, Yourui; Li, Guoliang; Wu, Yongning

    2018-04-04

    The present study reported a facile, sensitive, and efficient method for enrichment and determination of trace polycyclic aromatic hydrocarbons (PAHs) in food samples by employing new core-shell nanostructure magnetic covalent organic framework hybrid microspheres (Fe 3 O 4 @COF-(TpBD)) as the sorbent followed by HPLC-DAD. Under mild synthetic conditions, the Fe 3 O 4 @COF-(TpBD) were prepared with the retention of colloidal nanosize, larger specific surface area, higher porosity, uniform morphology, and supermagnetism. The as-prepared materials showed an excellent adsorption ability for PAHs, and the enrichment efficiency of the Fe 3 O 4 @COF-(TpBD) could reach 99.95%. The obtained materials also had fast adsorption kinetics and realized adsorption equilibrium within 12 min. The eluent was further analyzed by HPLC-DAD, and good linearity was observed in the range of 1-100 ng/mL with the linear correlation being above 0.9990. The limits of detection (S/N = 3) and limits of quantitation (S/N = 10) for 15 PAHs were in the range of 0.83-11.7 ng/L and 2.76-39.0 ng/L, respectively. For the application, the obtained materials were employed for the enrichment of trace PAHs in food samples and exhibited superior enrichment capacity and excellent applicability.

  18. No Pain, No Gain? A Resource-Based Model of Work-to-Family Enrichment and Conflict

    Science.gov (United States)

    Chen, Zheng; Powell, Gary N.

    2012-01-01

    Work-family scholars tend to work in two largely disconnected research streams, focusing on either work-family enrichment--the positive side of the work-family interface--or work-family conflict--the negative side of this interface. The purpose of this study is to suggest a reconciliation of the two research streams by proposing and testing a…

  19. PMT Dark Noise Monitoring System for Neutrino Detector Borexino Based on the Devicenet Protocol and WEB-Access

    International Nuclear Information System (INIS)

    Chepurnov, A.S.; Orekhov, D.I.; Maimistov, D.A.; Sabelnikov, A.A.; Etenko, A.V.

    2006-01-01

    Monitoring of PMT dark noise in a neutrino detector BOREXINO is a procedure that indicates condition of the detector. Based on CAN industrial network, top level DeviceNet protocol and WEB visualization, the dark noise monitoring system having 256 channels for the internal detector and for the external muon veto was created. The system is composed as a set of controllers, converting the PMT signals to frequency and transmitting them over Can network. The software is the stack of the DeviceNet protocols, providing the data collecting and transporting. Server-side scripts build web pages of user interface and graphical visualization of data

  20. Species delimitation and phylogenetic reconstruction of the sinipercids (Perciformes: Sinipercidae) based on target enrichment of thousands of nuclear coding sequences.

    Science.gov (United States)

    Song, Shuli; Zhao, Jinliang; Li, Chenhong

    2017-06-01

    The sinipercids are freshwater fishes endemic to East Asia, mainly in China. Phylogenetic studies on the sinipercids have made great progress in the last decades, but interspecific relationships and evolutionary history of the sinipercids remain unresolved. Lack of distinctive morphological characters leads to problems in validating of some species, such as Siniperca loona. Moreover, genetic data are needed to delimitate species pairs with explicit hypothesis testing, such as in S. chuatsi vs. S. kneri and Coreoperca whiteheadi vs. C. liui. Here we reconstructed phylogeny of the sinipercids with an unprecedented scale of data, 16,943 loci of single-copy coding sequence data from nine sinipercid species, eight putative sister taxa and two outgroups. Targeted sequences were collected using gene enrichment and Illumina sequencing, yielding thousands of protein coding sequences and single nucleotide polymorphisms (SNPs) data. Maximum likelihood and coalescent species tree analyses resulted in identical and highly supported trees. We confirmed that the centrarchids are sister to the sinipercids. A monophyletic Sinipercidae with two genera, Siniperca and Coreoperca was also supported. Different from most previous studies, S. scherzeri was found as the most basal taxon to other species of Siniperca, which consists of two clades: a clade having S. roulei sister to S. chuatsi and S. kneri, and a clade consisting S. loona sister to S. obscura and S. undulata. We found that both S. loona and C. liui are valid species using Bayes factor delimitation (BFD ∗ ) based on SNPs data. Species delimitation also provided decisive support for S. chuatsi and S. kneri being two distinct species. We calibrated a chronogram of the sinipercids based on 100 loci and three fossil calibration points using BEAST, and reconstructed ancestral ranges of the sinipercids using Lagrange Analysis (DEC model) and Statistical Dispersal-Vicariance Analysis (S-DIVA) implemented in RASP. Divergence time

  1. Alveolar Bone Resorption Evaluation Around Single-piece Designed Bicortical Implants, Using Immediate Loading Protocol, Based on Orthopantomographs

    Directory of Open Access Journals (Sweden)

    Száva Dániel-Tamás

    2017-12-01

    Full Text Available Background: Inserting dental implants in severely atrophied jawbones is a great challenge for the dental practitioner. There are an increasing number of patients who choose dental implantanchored prosthetic restorations despite compromised bone quality and quantity. There have been numerous attempts in adapting implant design for the atrophic crestal bone. One-piece, needle-type basal implant design is a typical design for these cases. These implants are inserted in the remaining compact bone located in the basal aspect of the jawbones. If high primary stability is achieved, these implants are used for immediate loading protocol. From many points of view, this technique is based on contradictory principles compared to classic implant surgery and loading protocols. The aim of this study was to investigate the long-term success of basal one-piece short-diameter dental implants used for immediate loading protocol.

  2. Selection based on indirect genetic effects for growth, environmental enrichment and coping style affect the immune status of pigs.

    Science.gov (United States)

    Reimert, Inonge; Rodenburg, T Bas; Ursinus, Winanda W; Kemp, Bas; Bolhuis, J Elizabeth

    2014-01-01

    Pigs living in intensive husbandry systems may experience both acute and chronic stress through standard management procedures and limitations in their physical and social environment, which may have implications for their immune status. Here, the effect of a new breeding method where pigs were selected on their heritable influence on their pen mates' growth, and environmental enrichment on the immune status of pigs was investigated. Hereto, 240 pigs with a relatively positive genetic effect on the growth of their pen mates (+SBV) and 240 pigs with a relatively negative genetic effect on the growth of their pen mates (-SBV) were housed in barren or straw-enriched pens from 4 to 23 weeks of age (n  =  80 pens in total). A blood sample was taken from the pigs before, three days after a 24 h regrouping test, and at week 22. In addition, effects of coping style, as assessed in a backtest, and gender were also investigated. Mainly, +SBV were found to have lower leukocyte, lymphocyte and haptoglobin concentrations than -SBV pigs. Enriched housed pigs had a lower neutrophil to lymphocyte (N:L) ratio and lower haptoglobin concentrations, but had higher antibody titers specific for Keyhole Limpet Hemocyanin (KLH) than barren housed pigs. No interactions were found between SBV class and housing. Furthermore, pigs with a proactive coping style had higher alternative complement activity and, in the enriched pens, higher antibody titers specific for KLH than pigs with a reactive coping style. Lastly, females tended to have lower leukocyte, but higher haptoglobin concentrations than castrated males. Overall, these results suggest that +SBV pigs and enriched housed pigs were less affected by stress than -SBV and barren housed pigs, respectively. Moreover, immune activation might be differently organized in individuals with different coping styles and to a lesser extent in individuals of opposite genders.

  3. Selection based on indirect genetic effects for growth, environmental enrichment and coping style affect the immune status of pigs.

    Directory of Open Access Journals (Sweden)

    Inonge Reimert

    Full Text Available Pigs living in intensive husbandry systems may experience both acute and chronic stress through standard management procedures and limitations in their physical and social environment, which may have implications for their immune status. Here, the effect of a new breeding method where pigs were selected on their heritable influence on their pen mates' growth, and environmental enrichment on the immune status of pigs was investigated. Hereto, 240 pigs with a relatively positive genetic effect on the growth of their pen mates (+SBV and 240 pigs with a relatively negative genetic effect on the growth of their pen mates (-SBV were housed in barren or straw-enriched pens from 4 to 23 weeks of age (n  =  80 pens in total. A blood sample was taken from the pigs before, three days after a 24 h regrouping test, and at week 22. In addition, effects of coping style, as assessed in a backtest, and gender were also investigated. Mainly, +SBV were found to have lower leukocyte, lymphocyte and haptoglobin concentrations than -SBV pigs. Enriched housed pigs had a lower neutrophil to lymphocyte (N:L ratio and lower haptoglobin concentrations, but had higher antibody titers specific for Keyhole Limpet Hemocyanin (KLH than barren housed pigs. No interactions were found between SBV class and housing. Furthermore, pigs with a proactive coping style had higher alternative complement activity and, in the enriched pens, higher antibody titers specific for KLH than pigs with a reactive coping style. Lastly, females tended to have lower leukocyte, but higher haptoglobin concentrations than castrated males. Overall, these results suggest that +SBV pigs and enriched housed pigs were less affected by stress than -SBV and barren housed pigs, respectively. Moreover, immune activation might be differently organized in individuals with different coping styles and to a lesser extent in individuals of opposite genders.

  4. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2010-05-01

    Full Text Available For monitoring burst events in a kind of reactive wireless sensor networks (WSNs, a multipath routing protocol (MRP based on dynamic clustering and ant colony optimization (ACO is proposed.. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively.

  5. A novel strategy to access high resolution DICOM medical images based on JPEG2000 interactive protocol

    Science.gov (United States)

    Tian, Yuan; Cai, Weihua; Sun, Jianyong; Zhang, Jianguo

    2008-03-01

    The demand for sharing medical information has kept rising. However, the transmission and displaying of high resolution medical images are limited if the network has a low transmission speed or the terminal devices have limited resources. In this paper, we present an approach based on JPEG2000 Interactive Protocol (JPIP) to browse high resolution medical images in an efficient way. We designed and implemented an interactive image communication system with client/server architecture and integrated it with Picture Archiving and Communication System (PACS). In our interactive image communication system, the JPIP server works as the middleware between clients and PACS servers. Both desktop clients and wireless mobile clients can browse high resolution images stored in PACS servers via accessing the JPIP server. The client can only make simple requests which identify the resolution, quality and region of interest and download selected portions of the JPEG2000 code-stream instead of downloading and decoding the entire code-stream. After receiving a request from a client, the JPIP server downloads the requested image from the PACS server and then responds the client by sending the appropriate code-stream. We also tested the performance of the JPIP server. The JPIP server runs stably and reliably under heavy load.

  6. Evaluation of imaging protocol for ECT based on CS image reconstruction algorithm

    International Nuclear Information System (INIS)

    Zhou Xiaolin; Yun Mingkai; Cao Xuexiang; Liu Shuangquan; Wang Lu; Huang Xianchao; Wei Long

    2014-01-01

    Single-photon emission computerized tomography and positron emission tomography are essential medical imaging tools, for which the sampling angle number and scan time should be carefully chosen to give a good compromise between image quality and radiopharmaceutical dose. In this study, the image quality of different acquisition protocols was evaluated via varied angle number and count number per angle with Monte Carlo simulation data. It was shown that, when similar imaging counts were used, the factor of acquisition counts was more important than that of the sampling number in emission computerized tomography. To further reduce the activity requirement and the scan duration, an iterative image reconstruction algorithm for limited-view and low-dose tomography based on compressed sensing theory has been developed. The total variation regulation was added to the reconstruction process to improve the signal to noise Ratio and reduce artifacts caused by the limited angle sampling. Maximization of the maximum likelihood of the estimated image and the measured data and minimization of the total variation of the image are alternatively implemented. By using this advanced algorithm, the reconstruction process is able to achieve image quality matching or exceed that of normal scans with only half of the injection radiopharmaceutical dose. (authors)

  7. Design, Implementation, and Study Protocol of a Kindergarten-Based Health Promotion Intervention

    Directory of Open Access Journals (Sweden)

    Susanne Kobel

    2017-01-01

    Full Text Available Inactivity and an unhealthy diet amongst others have led to an increased prevalence of overweight and obesity even in young children. Since most health behaviours develop during childhood health promotion has to start early. The setting kindergarten has been shown as ideal for such interventions. “Join the Healthy Boat” is a kindergarten-based health promotion programme with a cluster-randomised study focussing on increased physical activity, reduced screen media use, and sugar-sweetened beverages, as well as a higher fruit and vegetable intake. Intervention and materials were developed using Bartholomew’s Intervention Mapping approach considering Bandura’s social-cognitive theory and Bronfenbrenner’s ecological framework for human development. The programme is distributed using a train-the-trainer approach and currently implemented in 618 kindergartens. The effectiveness of this one-year intervention with an intervention and a control group will be examined in 62 kindergartens using standardised protocols, materials, and tools for outcome and process evaluation. A sample of 1021 children and their parents provided consent and participated in the intervention. Results of this study are awaited to give a better understanding of health behaviours in early childhood and to identify strategies for effective health promotion. The current paper describes development and design of the intervention and its implementation and planned evaluation. Trial Registration. The study is registered at the German Clinical Trials Register (DRKS, Freiburg University, Germany, ID: DRKS00010089.

  8. Local administration of enriched mononuclear cells, platelets and zoledronic acid for preventing collapse of the femoral head in the early stage of osteonecrosis: study protocol for a prospective randomized parallel-controlled clinical trial

    Directory of Open Access Journals (Sweden)

    Ning Ma

    2016-01-01

    Trial registration: ClinicalTrial.gov identifier: NCT02721940. Written approval for this protocol was obtained from the ethics committee of the Chinese PLA General Hospital in China (approval No. S2015-082-01.

  9. An Ad-Hoc Opportunistic Dissemination Protocol for Smartphone-based Participatory Traffic Monitoring

    NARCIS (Netherlands)

    Türkes, Okan; Seraj, Fatjon; Scholten, Johan; Meratnia, Nirvana; Havinga, Paul J.M.

    2015-01-01

    This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted

  10. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  11. South Australia, uranium enrichment

    International Nuclear Information System (INIS)

    1976-02-01

    The Report sets out the salient data relating to the establishment of a uranium processing centre at Redcliff in South Australia. It is conceived as a major development project for the Commonwealth, the South Australian Government and Australian Industry comprising the refining and enrichment of uranium produced from Australian mines. Using the data currently available in respect of markets, demand, technology and possible financial return from overseas sales, the project could be initiated immediately with hexafluoride production, followed rapidly in stages by enrichment production using the centrifuge process. A conceptual development plan is presented, involving a growth pattern that would be closely synchronised with the mining and production of yellowcake. The proposed development is presented in the form of an eight-and-half-year programme. Costs in this Report are based on 1975 values, unless otherwise stated. (Author)

  12. A novel tantalum-based sol-gel packed microextraction syringe for highly specific enrichment of phosphopeptides in MALDI-MS applications.

    Science.gov (United States)

    Çelikbıçak, Ömür; Atakay, Mehmet; Güler, Ülkü; Salih, Bekir

    2013-08-07

    A new tantalum-based sol-gel material was synthesized using a unique sol-gel synthesis pathway by PEG incorporation into the sol-gel structure without performing a calcination step. This improved its chemical and physical properties for the high capacity and selective enrichment of phosphopeptides from protein digests in complex biological media. The specificity of the tantalum-based sol-gel material for phosphopeptides was evaluated and compared with tantalum(V) oxide (Ta2O5) in different phosphopeptide enrichment applications. The tantalum-based sol-gel and tantalum(V) oxide were characterized in detail using FT-IR spectroscopy, X-ray diffraction (XRD) and scanning electron microscopy (SEM), and also using a surface area and pore size analyzer. In the characterization studies, the surface morphology, pore volume, crystallinity of the materials and PEG incorporation into the sol-gel structure to produce a more hydrophilic material were successfully demonstrated. The X-ray diffractograms of the two different materials were compared and it was noted that the broad signals of the tantalum-based sol-gel clearly represented the amorphous structure of the sol-gel material, which was more likely to create enough surface area and to provide more accessible tantalum atoms for phosphopeptides to be easily adsorbed when compared with the neat and more crystalline structure of Ta2O5. Therefore, the phosphopeptide enrichment performance of the tantalum-based sol-gels was found to be remarkably higher than the more crystalline Ta2O5 in our studies. Phosphopeptides at femtomole levels could be selectively enriched using the tantalum-based sol-gel and detected with a higher signal-to-noise ratio by matrix-assisted laser desorption/ionization-mass spectrometer (MALDI-MS). Moreover, phosphopeptides in a tryptic digest of non-fat bovine milk as a complex real-world biological sample were retained with higher yield using a tantalum-based sol-gel. Additionally, the sol-gel material

  13. A hospital-based child and adolescent overweight and obesity treatment protocol transferred into a community healthcare setting

    DEFF Research Database (Denmark)

    Mollerup, Pernille Maria; Gamborg, Michael Orland; Trier, Cæcilie

    2017-01-01

    BACKGROUND: Due to the pandemic of child and adolescent overweight and obesity, improvements in overweight and obesity treatment availability and accessibility are needed. METHODS: In this prospective study, we investigated if reductions in body mass index (BMI) standard deviation scores (SDS......) and waist circumference (WC) would occur during 1.5 years of community-based overweight and obesity treatment based upon an effective hospital-based overweight and obesity treatment protocol, The Children's Obesity Clinics' Treatment protocol. Height, weight, and WC were measured at all consultations...... was invested per child per year. CONCLUSION: BMI SDS and WC were reduced after 1.5 years of treatment. Hence, this community-based overweight and obesity treatment program may help accommodate the need for improvements in treatment availability and accessibility....

  14. Environmental enrichment for aquatic animals.

    Science.gov (United States)

    Corcoran, Mike

    2015-05-01

    Aquatic animals are the most popular pets in the United States based on the number of owned pets. They are popular display animals and are increasingly used in research settings. Enrichment of captive animals is an important element of zoo and laboratory medicine. The importance of enrichment for aquatic animals has been slower in implementation. For a long time, there was debate over whether or not fish were able to experience pain or form long-term memories. As that debate has reduced and the consciousness of more aquatic animals is accepted, the need to discuss enrichment for these animals has increased. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. World enrichment requirements to 2005

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    The primary enrichment suppliers-Eurodif, Techsnabexport, Urenco, and the US DOE - are positioning themselves to take advantage of the post - 1995 market. Overall, unfilled requirements represent about 40 percent of world requirements in the year 2000. The USA will be the primary market, as US utilities' unfilled enrichment requirements account for over 60 percent of the world's total unfilled requirements. The enrichment market is moving toward more global competition, as each supplier tries to maintain its current regional market base and then to capture additional market share in other regions

  16. Switching From Age-Based Stimulus Dosing to Dose Titration Protocols in Electroconvulsive Therapy: Empirical Evidence for Better Patient Outcomes With Lower Peak and Cumulative Energy Doses.

    Science.gov (United States)

    O'Neill-Kerr, Alex; Yassin, Anhar; Rogers, Stephen; Cornish, Janie

    2017-09-01

    The aim of this study was to test the proposition that adoption of a dose titration protocol may be associated with better patient outcomes, at lower treatment dose, and with comparable cumulative dose to that in patients treated using an age-based stimulus dosing protocol. This was an analysis of data assembled from archived records and based on cohorts of patients treated respectively on an age-based stimulus dosing protocol and on a dose titration protocol in the National Health Service in England. We demonstrated a significantly better response in the patient cohort treated with dose titration than with age-based stimulus dosing. Peak doses were less and the total cumulative dose was less in the dose titration group than in the age-based stimulus dosing group. Our findings are consistent with superior outcomes in patients treated using a dose titration protocol when compared with age-based stimulus dosing in a similar cohort of patients.

  17. The protocols for the 10/66 dementia research group population-based research programme

    Directory of Open Access Journals (Sweden)

    Salas Aquiles

    2007-07-01

    Full Text Available Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Methods/design Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina, with a sample size of between 1000 and 3000 (generally 2000. Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain. Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815. A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. Discussion The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our

  18. Other enrichment related contracts

    International Nuclear Information System (INIS)

    Hall, J.C.

    1978-01-01

    In addition to long-term enrichment contracts, DOE has other types of contracts: (1) short-term, fixed-commitment enrichment contract; (2) emergency sales agreement for enriched uranium; (3) feed material lease agreement; (4) enriched uranium storage agreement; and (5) feed material usage agreement

  19. Conversion of highly enriched uranium in thorium-232 based oxide fuel for light water reactors: MOX-T fuel

    Energy Technology Data Exchange (ETDEWEB)

    Vapirev, E I; Jordanov, T; Christoskov, I [Sofia Univ. (Bulgaria). Fizicheski Fakultet

    1994-12-31

    The idea of conversion of highly enriched uranium (HEU) from warheads without mixing it with natural uranium as well as the utilization of plutonium as fuel component is discussed. A nuclear fuel which is a mixture of 4% {sup 235}U (HEU) as a fissile isotope and 96 % {sup 232}Th (ThO{sub 2}) as a non-fissile isotope in a mixed oxide with thorium fuel is proposed. It is assumed that plutonium can also be used in the proposed fuel in a mixture with {sup 235}U. The following advantages of the use of HEU in LWRs in mixed {sup 235}U - Th fuel are pointed out: (1) No generation of long-living plutonium and americium isotopes (in case of reprocessing the high level radioactive wastes will contain only fission fragments and uranium); (2) The high conversion ratio of Th extends the expected burnup by approximately 1/3 without higher initial enrichment (the same initial enrichment simplifies the problem for compensation of the excess reactivity in the beginning with burnable poison and boric acid); (3) The high conversion ratio of Th allows the fuel utilization with less initial enrichment (by approx. 1/3) for the same burnup; thus less excess reactivity has to be compensated after reloading; in case of fuel reprocessing all fissile materials ({sup 235}U + {sup 233}U) could be chemically extracted. Irrespectively to the optimistic expectations outlined, further work including data on optimal loading and reloading schemes, theoretical calculations of thermal properties of {sup 235}U + Th fuel rods, manufacturing of several test fuel assemblies and investigations of their operational behaviour in a reactor core is still needed. 1 fig., 7 refs.

  20. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    Science.gov (United States)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  1. Interface Assignment-Based AODV Routing Protocol to Improve Reliability in Multi-Interface Multichannel Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2015-01-01

    Full Text Available The utilization of wireless mesh networks (WMNs has greatly increased, and the multi-interface multichannel (MIMC technic has been widely used for the backbone network. Unfortunately, the ad hoc on-demand distance vector (AODV routing protocol defined in the IEEE 802.11s standard was designed for WMNs using the single-interface single-channel technic. So, we define a problem that happens when the legacy AODV is used in MIMC WMNs and propose an interface assignment-based AODV (IA-AODV in order to resolve that problem. IA-AODV, which is based on multitarget path request, consists of the PREQ prediction scheme, the PREQ loss recovery scheme, and the PREQ sender assignment scheme. A detailed operation according to various network conditions and services is introduced, and the routing efficiency and network reliability of a network using IA-AODV are analyzed over the presented system model. Finally, after a real-world test-bed for MIMC WMNs using the IA-AODV routing protocol is implemented, the various indicators of the network are evaluated through experiments. When the proposed routing protocol is compared with the existing AODV routing protocol, it performs the path update using only 14.33% of the management frames, completely removes the routing malfunction, and reduces the UDP packet loss ratio by 0.0012%.

  2. Detecting child abuse based on parental characteristics: does the Hague Protocol cause parents to avoid the emergency department?

    Science.gov (United States)

    Diderich, Hester M; Fekkes, Minne; Dechesne, Mark; Buitendijk, Simone E; Oudesluys-Murphy, Anne Marie

    2015-04-01

    The Hague Protocol is used by professionals at the adult Emergency Departments (ED) in The Netherlands to detect child abuse based on three parental characteristics: (1) domestic violence, (2) substance abuse or (3) suicide attempt or self-harm. After detection, a referral is made to the Reporting Center for Child Abuse and Neglect (RCCAN). This study investigates whether implementing this Protocol will lead parents to avoid medical care. We compared the number of patients (for whom the Protocol applied) who attended the ED prior to implementation with those attending after implementation. We conducted telephone interviews (n = 14) with parents whose children were referred to the RCCAN to investigate their experience with the procedure. We found no decline in the number of patients, included in the Protocol, visiting the ED during the 4 year implementation period (2008-2011). Most parents (n = 10 of the 14 interviewed) were positive and stated that they would, if necessary, re-attend the ED with the same complaints in the future. ED nurses and doctors referring children based on parental characteristics do not have to fear losing these families as patients. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Polyethylene glycol 3350 based colon cleaning protocol: 2 d vs 4 d head to head comparison.

    Science.gov (United States)

    Elitsur, Rotem; Butcher, Lisa; Vicki, Lund; Elitsur, Yoram

    2013-04-16

    To compare between 2 and 4 d colon cleansing protocols. Children who were scheduled for colonoscopy procedure (2010-2012) for various medical reasons, were recruited from the pediatric gastroenterology clinic at Marshall University School of Medicine, Huntington, WV. Exclusion criteria were patients who were allergic to the medication used in the protocols [polyethylene glycol (PEG) 3350, Bisacodyl], or children with metabolic or renal diseases. Two PEG 3350 protocols for 4 d (A) and 2 d (B) were prescribed as previously described. A questionnaire describing the volume of PEG consumed, clinical data, and side effects were recorded. Colon preparation was graded by two observers according to previously described method. Rate of adequate colon preparation. A total of 78 patients were considered for final calculation (group A: 40, group B: 38). Age and stool consistency at the last day was comparable in both groups, but the number of stools/day was significantly higher in group B (P = 0.001). Adequate colon preparation was reached in 57.5% (A) and 73.6% (B), respectively (P = 0.206). Side effects were minimal and comparable in both groups. There was no difference in children's age, stool characteristics, or side effects between the children with adequate or inadequate colon preparation. Correlation and agreement between observers was excellent (Pearson correlation = 0.972, kappa = 1.0). No difference between protocols was observed, but the 2 d protocol was superior for its shorter time. Direct comparison between different colon cleansing protocols is crucial in order to establish the "gold standard" protocol for children.

  4. Regulation of the Contribution of Integrin to Cell Attachment on Poly(2-Methoxyethyl Acrylate (PMEA Analogous Polymers for Attachment-Based Cell Enrichment.

    Directory of Open Access Journals (Sweden)

    Takashi Hoshiba

    Full Text Available Cell enrichment is currently in high demand in medical engineering. We have reported that non-blood cells can attach to a blood-compatible poly(2-methoxyethyl acrylate (PMEA substrate through integrin-dependent and integrin-independent mechanisms because the PMEA substrate suppresses protein adsorption. Therefore, we assumed that PMEA analogous polymers can change the contribution of integrin to cell attachment through the regulation of protein adsorption. In the present study, we investigated protein adsorption, cell attachment profiles, and attachment mechanisms on PMEA analogous polymer substrates. Additionally, we demonstrated the possibility of attachment-based cell enrichment on PMEA analogous polymer substrates. HT-1080 and MDA-MB-231 cells started to attach to poly(butyl acrylate (PBA and poly(tetrahydrofurfuryl acrylate (PTHFA, on which proteins could adsorb well, within 1 h. HepG2 cells started to attach after 1 h. HT-1080, MDA-MB-231, and HepG2 cells started to attach within 30 min to PMEA, poly(2-(2-methoxyethoxy ethyl acrylate-co-butyl acrylate (30:70 mol%, PMe2A and poly(2-(2-methoxyethoxy ethoxy ethyl acrylate-co-butyl acrylate (30:70 mol%, PMe3A, which suppress protein adsorption. Moreover, the ratio of attached cells from a cell mixture can be changed on PMEA analogous polymers. These findings suggested that PMEA analogous polymers can be used for attachment-based cell enrichment.

  5. Effect of cooking method on the fatty acid content of reduced-fat and PUFA-enriched pork patties formulated with a konjac-based oil bulking system.

    Science.gov (United States)

    Salcedo-Sandoval, Lorena; Cofrades, Susana; Ruiz-Capillas, Claudia; Jiménez-Colmenero, Francisco

    2014-12-01

    The effect of cooking methods (electric grilling and pan-frying in olive oil) on the composition of reduced-fat and reduced-fat/PUFA enriched pork patties was studied. Fat reduction was performed by replacing pork backfat (38% and 100%) with konjac gel and PUFA-enrichment by replacing pork backfat (49%) with a konjac-based oil bulking system stabilizing a healthier oil combination (olive, linseed and fish oils). Cooking losses (13%-27%) were affected (pcooking procedure. Compared with raw products, cooked samples had higher (pcooked, the PUFA levels in the medium-fat/improved sample containing the oil bulking system ranged between 1.4 and 1.6g/100g (0.47-0.51 from n-3 PUFAs), with EPA+DHA concentrations of around 75mg/100g. Konjac materials were successfully used to produce pork patties with a better lipid composition. Copyright © 2014. Published by Elsevier Ltd.

  6. The Architecture of WiFi-Based WSN for AMR System and E-HWMP Routing Protocol

    Directory of Open Access Journals (Sweden)

    Li LI

    2014-02-01

    Full Text Available With the development of SoC technology in recent years, the ultra-low power WiFi System on SoC Chip has emerged. As a result, WiFi-based Wireless Sensor Networks come into use, especially used in Automatic Meter Reading. While because the nodes of Wireless Sensor Networks have limited energy supply, smaller storage capability and slower calculation ability, the current WiFi technology cannot be directly applied to WiFi-based Wireless Sensor Networks. The protocols should be upgraded and the security algorithms should be improved to meet the new requests. Firstly, this article describes the network architecture of WiFi-based WSN for AMR system and discusses the reason for using this analogous Mesh architecture. Secondly, the new Hardware architecture of WiFi-based WSN node is designed to realize the AMR system and verify the research work. The node can collect the data of power meter by WiFi and can be powered by a Lithium Battery. Thirdly, on the basis of study work of WiFi original routing protocol HWMP, a new method on improving the energy saving ability of HWMP to adapt the new features of WiFi-based WSN is proposed. And the simulation work on the new routing protocol E-HWMP has been done with NS2 and the simulation results show that the life cycle of the network has been extended to some degree.

  7. Facile and easily popularized synthesis of L-cysteine-functionalized magnetic nanoparticles based on one-step functionalization for highly efficient enrichment of glycopeptides.

    Science.gov (United States)

    Feng, Xiaoyan; Deng, Chunhui; Gao, Mingxia; Zhang, Xiangmin

    2018-01-01

    Protein glycosylation is one of the most important post-translational modifications. Also, efficient enrichment and separation of glycopeptides from complex samples are crucial for the thorough analysis of glycosylation. Developing novel hydrophilic materials with facile and easily popularized synthesis is an urgent need in large-scale glycoproteomics research. Herein, for the first time, a one-step functionalization strategy based on metal-organic coordination was proposed and Fe 3 O 4 nanoparticles were directly functionalized with zwitterionic hydrophilic L-cysteine (L-Cys), greatly simplifying the synthetic procedure. The easily synthesized Fe 3 O 4 /L-Cys possessed excellent hydrophilicity and brief composition, contributing to affinity for glycopeptides and reduction in nonspecific interaction. Thus, Fe 3 O 4 /L-Cys nanoparticles showed outstanding sensitivity (25 amol/μL), high selectivity (mixture of bovine serum albumin and horseradish peroxidase tryptic digests at a mass ratio of 100:1), good reusability (five repeated times), and stability (room temperature storage of 1 month). Encouragingly, in the glycosylation analysis of human serum, a total of 376 glycopeptides with 393 N-glycosylation sites corresponding to 118 glycoproteins were identified after enrichment with Fe 3 O 4 /L-Cys, which was superior to ever reported L-Cys modified magnetic materials. Furthermore, applying the one-step functionalization strategy, cysteamine and glutathione respectively direct-functionalized Fe 3 O 4 nanoparticles were successfully synthesized and also achieved efficient glycopeptide enrichment in human serum. The results indicated that we have presented an efficient and easily popularized strategy in glycoproteomics as well as in the synthesis of novel materials. Graphical abstract Fe 3 O 4 /L-Cys nanoparticles based on one-step functionalization for highly efficient enrichment of glycopeptides.

  8. Dental care protocol based on visual supports for children with autism spectrum disorders.

    Science.gov (United States)

    Cagetti, Maria Grazia; Mastroberardino, Stefano; Campus, Stefano; Olivari, Benedetta; Faggioli, Raffaella; Lenti, Carlo; Strohmenger, Laura

    2015-09-01

    Subjects with Autism Spectrum Disorders (ASDs) have often difficulties to accept dental treatments. The aim of this study is to propose a dental care protocol based on visual supports to facilitate children with ASDs to undergo to oral examination and treatments. 83 children (age range 6-12 years) with a signed consent form were enrolled; intellectual level, verbal fluency and cooperation grade were evaluated. Children were introduced into a four stages path in order to undergo: an oral examination (stage 1), a professional oral hygiene session (stage 2), sealants (stage 3), and, if necessary, a restorative treatment (stage 4). Each stage came after a visual training, performed by a psychologist (stage 1) and by parents at home (stages 2, 3 and 4). Association between acceptance rates at each stage and gender, intellectual level, verbal fluency and cooperation grade was tested with chi-square test if appropriate. Seventy-seven (92.8%) subjects overcame both stage 1 and 2. Six (7.2%) refused stage 3 and among the 44 subjects who need restorative treatments, only three refused it. The acceptance rate at each stage was statistically significant associated to the verbal fluency (p=0.02; p=0.04; p=0.01, respectively for stage 1, 3 and 4). In stage 2 all subjects accepted to move to the next stage. The verbal/intellectual/cooperation dummy variable was statistically associated to the acceptance rate (pvisual supports has shown to be able to facilitate children with ASDs to undergo dental treatments even in non-verbal children with a low intellectual level, underlining that behavioural approach should be used as the first strategy to treat patients with ASDs in dental setting.

  9. Host based internet protocol (IP) packet analysis to enhance network security

    International Nuclear Information System (INIS)

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  10. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    Science.gov (United States)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  11. A Multipath Routing Protocol Based on Bloom Filter for Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Junwei Jin

    2016-01-01

    Full Text Available On-demand multipath routing in a wireless ad hoc network is effective in achieving load balancing over the network and in improving the degree of resilience to mobility. In this paper, the salvage capable opportunistic node-disjoint multipath routing (SNMR protocol is proposed, which forms multiple routes for data transmission and supports packet salvaging with minimum overhead. The proposed mechanism constructs a primary path and a node-disjoint backup path together with alternative paths for the intermediate nodes in the primary path. It can be achieved by considering the reverse route back to the source stored in the route cache and the primary path information compressed by a Bloom filter. Our protocol presents higher capability in packet salvaging and lower overhead in forming multiple routes. Simulation results show that SNMR outperforms the compared protocols in terms of packet delivery ratio, normalized routing load, and throughput.

  12. Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP

    Directory of Open Access Journals (Sweden)

    RATNA SUSANA

    2016-02-01

    Full Text Available Abstrak Hypertext Transfer Protocol (HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW. Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website. Kata kunci:  basis data, data logger, Hypertext Transfer Protocol (HTTP, website, protokol jaringan. Abstract Hypertext Transfer Protocol (HTTP is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW. This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16

  13. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  14. Measurement of Soot Volume Fraction and Temperature for Oxygen-Enriched Ethylene Combustion Based on Flame Image Processing

    Directory of Open Access Journals (Sweden)

    Weijie Yan

    2017-05-01

    Full Text Available A method for simultaneously visualizing the two-dimensional distributions of temperature and soot volume fraction in an ethylene flame was presented. A single-color charge-coupled device (CCD camera was used to capture the flame image in the visible spectrum considering the broad-response spectrum of the R and G bands of the camera. The directional emissive power of the R and G bands were calibrated and used for measurement. Slightly increased temperatures and reduced soot concentration were predicted in the central flame without self-absorption effects considered, an iterative algorithm was used for eliminating the effect of self-absorption. Nine different cases were presented in the experiment to demonstrate the effects of fuel mass flow rate and oxygen concentration on temperature and soot concentration in three different atmospheres. For ethylene combustion in pure-air atmosphere, as the fuel mass flow rate increased, the maximum temperature slightly decreased, and the maximum soot volume fraction slightly increased. For oxygen fractions of 30%, 40%, and 50% combustion in O2/N2 oxygen-enhanced atmospheres, the maximum flame temperatures were 2276, 2451, and 2678 K, whereas combustion in O2/CO2 atmospheres were 1916, 2322, and 2535 K. The maximum soot volume fractions were 4.5, 7.0, and 9.5 ppm in oxygen-enriched O2/N2 atmosphere and 13.6, 15.3, and 14.8 ppm in oxygen-enriched O2/CO2 atmosphere. Compared with the O2/CO2 atmosphere, combustion in the oxygen-enriched O2/N2 atmosphere produced higher flame temperature and larger soot volume fraction. Preliminary results indicated that this technique is reliable and can be used for combustion diagnosis.

  15. Oxidative Stability of Granola Bars Enriched with Multilayered Fish Oil Emulsion in the Presence of Novel Brown Seaweed Based Antioxidants

    DEFF Research Database (Denmark)

    Hermund, Ditte Baun; Karadaǧ, Ayşe; Andersen, Ulf

    2016-01-01

    as a barrier to the penetration and diffusion of molecular species that promote oxidation. The positive charge of oil droplets in the secondary emulsion may also inhibit iron-lipid interaction through electrostatic repulsion. Additional protection against lipid oxidation was obtained when fish oil emulsions......Fucus vesiculosus extracts that have both radical scavenging activity and metal chelating ability in vitro were used as natural antioxidant in granola bars enriched with fish oil emulsion by using primary and secondary emulsion systems stabilized by sodium caseinate alone and sodium caseinate...

  16. SELF-POWERED WIRELESS SENSOR NODE POWER MODELING BASED ON IEEE 802.11 COMMUNICATION PROTOCOL

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Raymond A. DeCarlo; Lefteri H. Tsoukalas

    2016-04-01

    Design and technical advancements in sensing, processing, and wireless communication capabilities of small, portable devices known as wireless sensor nodes (WSNs) have drawn extensive research attention and are vastly applied in science and engineering applications. The WSNs are typically powered by a chemical battery source that has a load dependent finite lifetime. Most applications, including the nuclear industry applications, require WSNs to operate for an extended period of time beginning with their deployment. To ensure longevity, it is important to develop self-powered WSNs. The benefit of self-powered WSNs goes far beyond the cost savings of removing the need for cable installation and maintenance. Self-powered WSNs will potentially offer significant expansion in remote monitoring of nuclear facilities, and provide important data on plant equipment and component status during normal operation, as well as in case of abnormal operation, station blackouts or post-accident evaluation. Advancements in power harvesting technologies enable electric energy generation from many sources, including kinetic, thermal, and radiated energy. For the ongoing research at Idaho National Laboratory, a solid-state thermoelectric-based technology, the thermoelectric generator (TEG), is used to convert thermal energy to power a WSN. The design and development of TEGs to power WSNs that would remain active for a long period of time requires comprehensive understanding of WSN operational. This motivates the research in modeling the lifetime, i.e., power consumption, of a WSN by taking into consideration various node and network level activities. A WSN must perform three essential tasks: sense events, perform quick local information processing of sensed events, and wirelessly exchange locally processed data with the base station or with other WSNs in the network. Each task has a power cost per unit tine and an additional cost when switching between tasks. There are number of other

  17. Direct analysis of δ2H and δ18O in natural and enriched human urine using laser-based, Off-Axis Integrated Cavity Output Spectroscopy

    Science.gov (United States)

    Berman, Elena S.F.; Fortsona, Susan L.; Snaith, Steven P.; Gupta, Manish; Baer, Douglas S.; Chery, Isabelle; Blanc, Stephane; Melanson, Edward L.; Thomson, Peter J; Speakman, John R.

    2012-01-01

    The stable isotopes of hydrogen (δ2H) and oxygen (δ18O) in human urine are measured during studies of total energy expenditure by the doubly labeled water method, measurement of total body water, and measurement of insulin resistance by glucose disposal among other applications. An ultrasensitive laser absorption spectrometer based on off-axis integrated cavity output spectroscopy was demonstrated for simple and inexpensive measurement of stable isotopes in natural isotopic abundance and isotopically enriched human urine. Preparation of urine for analysis was simple and rapid (approx. 25 samples per hour), requiring no decolorizing or distillation steps. Analysis schemes were demonstrated to address sample-to-sample memory while still allowing analysis of 45 natural or 30 enriched urine samples per day. The instrument was linear over a wide range of water isotopes (δ2H = −454 to +1702 ‰ and δ18O= −58.3 to +265 ‰). Measurements of human urine were precise to better than 0.65 ‰ 1σ for δ2H and 0.09 ‰ 1σ for δ18O for natural urines, 1.1 ‰ 1σ for δ2H and 0.13 ‰ 1σ for δ18O for low enriched urines, and 1.0 ‰ 1σ for δ2H and 0.08 ‰ 1σ for δ18O for high enriched urines. Furthermore, the accuracy of the isotope measurements of human urines was verified to better than ±0.81 ‰ in δ2H and ±0.13 ‰ in δ18O (average deviation) against three independent IRMS laboratories. The ability to immediately and inexpensively measure the stable isotopes of water in human urine is expected to increase the number and variety of experiments which can be undertaken. PMID:23075099

  18. Implementing exercise in cancer care: study protocol to evaluate a community-based exercise program for people with cancer

    OpenAIRE

    Cormie, Prue; Lamb, Stephanie; Newton, Robert U.; Valentine, Lani; McKiernan, Sandy; Spry, Nigel; Joseph, David; Taaffe, Dennis R.; Doran, Christopher M.; Galv?o, Daniel A.

    2017-01-01

    Background Clinical research has established the efficacy of exercise in reducing treatment-related side-effects and increasing wellbeing in people with cancer. Major oncology organisations have identified the importance of incorporating exercise in comprehensive cancer care but information regarding effective approaches to translating evidence into practice is lacking. This paper describes the implementation of a community-based exercise program for people with cancer and the protocol for pr...

  19. Study protocol for the evaluation of an Infant Simulator based program delivered in schools: a pragmatic cluster randomised controlled trial

    OpenAIRE

    Brinkman, Sally A; Johnson, Sarah E; Lawrence, David; Codde, James P; Hart, Michael B; Straton, Judith AY; Silburn, Sven

    2010-01-01

    Abstract Background This paper presents the study protocol for a pragmatic randomised controlled trial to evaluate the impact of a school based program developed to prevent teenage pregnancy. The program includes students taking care of an Infant Simulator; despite growing popularity and an increasing global presence of such programs, there is no published evidence of their long-term impact. The aim of this trial is to evaluate the Virtual Infant Parenting (VIP) program by investigating pre-c...

  20. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.