WorldWideScience

Sample records for bispectral index-guided protocol

  1. Protocol for the BAG-RECALL clinical trial: a prospective, multi-center, randomized, controlled trial to determine whether a bispectral index-guided protocol is superior to an anesthesia gas-guided protocol in reducing intraoperative awareness with explicit recall in high risk surgical patients

    Directory of Open Access Journals (Sweden)

    Villafranca Alex

    2009-11-01

    Full Text Available Abstract Background Awareness with explicit recall of intra-operative events is a rare and distressing complication that may lead to severe psychological symptoms. Candidate depth of anesthesia monitors have been developed, partly with the aim of preventing this complication. Despite conflicting results from clinical trials and the lack of incisive validation, such monitors have enjoyed widespread clinical adoption, in particular the bispectral index. The American Society of Anesthesiologists has called for adequately powered and rigorously designed clinical trials to determine whether the use of such monitors decreases the incidence of awareness in various settings. The aim of this study is to determine with increased precision whether incorporating the bispectral index into a structured general anesthesia protocol decreases the incidence of awareness with explicit recall among a subset of surgical patients at increased risk for awareness and scheduled to receive an inhalation gas-based general anesthetic. Methods/Design BAG-RECALL is a multi-center, randomized, controlled clinical trial, in which 6,000 patients are being assigned to bispectral index-guided anesthesia (target range, 40 to 60 or end-tidal anesthetic gas-guided anesthesia (target range, 0.7 to 1.3 age-adjusted minimum alveolar concentration. Postoperatively, patients are being assessed for explicit recall at two intervals (0 to 72 hours, and 30 days after extubation. The primary outcome of the trial is awareness with explicit recall. Secondary outcomes include postoperative mortality, psychological symptoms, intensive care and hospital length of stay, average anesthetic gas administration, postoperative pain and nausea and vomiting, duration of stay in the recovery area, intra-operative dreaming, and postoperative delirium. Discussion This trial has been designed to complement two other clinical trials: B-Unaware and MACS (ClinicalTrials.gov numbers, NCT00281489 and NCT00689091

  2. Feasibility of bispectral index-guided propofol infusion for flexible bronchoscopy sedation: a randomized controlled trial.

    Directory of Open Access Journals (Sweden)

    Yu-Lun Lo

    Full Text Available There are safety issues associated with propofol use for flexible bronchoscopy (FB. The bispectral index (BIS correlates well with the level of consciousness. The aim of this study was to show that BIS-guided propofol infusion is safe and may provide better sedation, benefiting the patients and bronchoscopists.After administering alfentanil bolus, 500 patients were randomized to either propofol infusion titrated to a BIS level of 65-75 (study group or incremental midazolam bolus based on clinical judgment to achieve moderate sedation. The primary endpoint was safety, while the secondary endpoints were recovery time, patient tolerance, and cooperation.The proportion of patients with hypoxemia or hypotensive events were not different in the 2 groups (study vs. control groups: 39.9% vs. 35.7%, p = 0.340; 7.4% vs. 4.4%, p = 0.159, respectively. The mean lowest blood pressure was lower in the study group. Logistic regression revealed male gender, higher American Society of Anesthesiologists physical status, and electrocautery were associated with hypoxemia, whereas lower propofol dose for induction was associated with hypotension in the study group. The study group had better global tolerance (p<0.001, less procedural interference by movement or cough (13.6% vs. 36.1%, p<0.001; 30.0% vs. 44.2%, p = 0.001, respectively, and shorter time to orientation and ambulation (11.7±10.2 min vs. 29.7±26.8 min, p<0.001; 30.0±18.2 min vs. 55.7±40.6 min, p<0.001, respectively compared to the control group.BIS-guided propofol infusion combined with alfentanil for FB sedation provides excellent patient tolerance, with fast recovery and less procedure interference.ClinicalTrials. gov NCT00789815.

  3. Clinical vs. bispectral index-guided propofol induction of anesthesia: A comparative study

    Directory of Open Access Journals (Sweden)

    Snehdeep Arya

    2013-01-01

    Full Text Available Background: Clinically optimized focusing of drug administration to specific need of patient with bispectral index (BIS monitoring results in reduced dose and faster recovery of consciousness. This study was planned with an aim to study and compare the conventional clinical end point or BIS on the requirement of dosage of propofol, hemodynamic effects, and BIS alterations following propofol induction. Methods: 70 patients, ASA I and II, 20-60 years undergoing elective surgical procedure under general anesthesia with endotracheal intubation were selected and divided into two groups. Group A received (inj. fentanyl (2 μg/kg, followed 3 min later by inj. propofol at the rate of 30 mg/kg/hr infusion till the loss of response to verbal command while group B received inj. fentanyl (2 μg/kg, followed 3 min later by inj. propofol at the rate of 30 mg/kg/hr infusion. The end point of hypnosis was when the BIS value was sustained for 1 min at 48±2. The patients were intubated. Total induction dose of propofol was noted in each group. The value of BIS and hemodynamic parameters (heart rate, systolic/diastolic blood pressure were noted at the time of loss of consciousness, at the time of intubation, and 1 min after intubation, thereafter every minute for first 10 min and thereafter every 10 min till end of surgery. Any involuntary muscle activity such as jerky movements, dystonic posturing, and opisthotonos were also recorded. Results: The mean dose of propofol used in groups A and B were 1.85±0.48 mg/kg and 1.79±0.41 mg/kg, respectively. The dosage used in group B were less but not clinically significant (P=0.575. On comparing the dosage of propofol in males among the groups there was a significantly lower dosage of propofol required in group B (2.06±0.45 mg/kg and 1.83±0.32 mg/kg, respectively, P=0.016. This decrease however was not seen in female patients dosage being 1.65±0.44 mg/kg and 1.75±0.49 mg/kg, respectively (P=0.372. The hemodynamic

  4. Neuroprotective effect of bispectral index-guided fast-track anesthesia using sevoflurane combined with dexmedetomidine for intracranial aneurysm embolization

    Directory of Open Access Journals (Sweden)

    Chao-liang Tang

    2018-01-01

    Full Text Available Dexmedetomidine has sedative, anxiolytic, analgesic, anti-sympathetic, and anti-shivering effects. Dexmedetomidine might be effective in combination with sevoflurane for anesthesia, but prospective randomized controlled clinical trials with which to verify this hypothesis are lacking. In total, 120 patients who underwent embolization of an intracranial aneurysm were recruited from Anhui Provincial Hospital and Renmin Hospital of Wuhan University of China and randomly allocated to two groups. After intraoperative administration of 2% to 3% sevoflurane inhalation, one group of patients received pump-controlled intravenous injection of 1.0 μg/kg dexmedetomidine for 15 minutes followed by maintenance with 0.3 μg/kg/h until the end of surgery; the other group of patients only underwent pump-controlled infusion of saline. Bispectral index monitoring revealed that dexmedetomidine-assisted anesthesia can shorten the recovery time of spontaneous breathing, time to eye opening, and time to laryngeal mask removal. Before anesthetic induction and immediately after laryngeal mask airway removal, the glucose and lactate levels were low, the S100β and neuron-specific enolase levels were low, the perioperative blood pressure and heart rate were stable, and postoperative delirium was minimal. These findings indicate that dexmedetomidine can effectively assist sevoflurane for anesthesia during surgical embolization of intracranial aneurysms, shorten the time to consciousness and extubation, reduce the stress response and energy metabolism, stabilize hemodynamic parameters, and reduce adverse reactions, thereby reducing the damage to the central nervous system. This trial was registered at the Chinese Clinical Trial Registry (http://www.chictr.org.cn/ (registration number: ChiCTR-IPR-16008113.

  5. Bispectral index-guided general anaesthesia in combination with interscalene block reduces desflurane consumption in arthroscopic shoulder surgery: a clinical comparison of bupivacaine versus levobupivacaine.

    Science.gov (United States)

    Ozturk, Levent; Kesimci, Elvin; Albayrak, Tuna; Kanbak, Orhan

    2015-07-21

    The goal of this study was to compare the influence of an interscalene brachial plexus block (ISB) performed with either bupivacaine or levobupivacaine in conjunction with general anaesthesia (GA) on desflurane consumption, which was titrated to maintain the recovery profiles and postoperative analgesia while also keeping the bispectral index score (BIS) between 40 and 60 in patients undergoing arthroscopic shoulder surgery. Sixty patients undergoing arthroscopic shoulder surgery were prospectively randomized to receive GA with desflurane alone (group C) or in combination with a preoperative ISB by either bupivacaine 0.25 % (group B) 40 ml or levobupivacaine 0.25 % (group L) 40 ml. BIS scores or respiratory and hemodynamic parameters during the operation, recovery characteristics, consumed doses of desflurane and pain intensities were evaluated. The eye opening time was 4.0 ± 2.5 minutes for group B, 4.6 ± 2.4 minutes for group L, and 6.2 ± 2.1 minutes for group C (p surgery were higher in group C (p shoulder surgery. The trial registration number is ACTRN12613000381785.

  6. A bispectral index guided comparison of target-controlled versus manually-controlled infusion of propofol and remifentanil for attenuation of pressor response to laryngoscopy and tracheal intubation in non cardiac surgery

    Directory of Open Access Journals (Sweden)

    Naser Yeganeh

    2006-12-01

    Full Text Available BACKGROUND: Target-controlled infusion is a new delivery system for intravenous anesthetic agents with which the anesthetist targets a plasma or effect-site drug concentration to achieve a predetermined effect. With this system, the tedious task of calculating the amount of administered drug required to achieve the target concentration is left in charge of a microprocessor which commands the infusion device. In this prospective study we compared alterations in blood pressure and heart rate from initiation of induction of anesthesia until 3 minutes after tracheal intubation in two methods of drug infusion, target-controlled infusion (TCI and manually controlled infusion (MCI. Total anesthetic drug used until 3 minutes after intubation and level of produced hypnosis also were compared between two methods. METHODS: 40 patients were enrolled in this clinical trial study and were allocated randomly in two groups, each group consisting of 20 patients. In TCI group, patients received propofol and remifentanil with TCI pump to achieve 7 µg/ml and 4 ng/ml as plasmatic target drug levels, respectively. In MCI group, patients received propofol 2 mg/kg and remifentanil 1 µg/kg of body weight with manually controlled infusion. Both groups received succinylcholine as muscle relaxant to facilitate laryngoscopy and tracheal intubation. Bispectral index (BIS was passively recorded in two groups to compare the level of hypnosis. Blood pressure (BP and heart rate (HR were recorded at 5 different times (T-1, T0, T1, T2 and T3. Independent t-test and paired t-test were used for data analysis. RESULTS: Systolic arterial pressure (SAP was not different at T-1 between two groups but systolic hypotension was seen in MCI group more than TCI group at T0 (P<0.05. Systolic hypertension was more common in MCI group after intubation; i.e. SAP showed significant differences in T1, T2 and T3 between two groups (P<0.05. Mean arterial pressure (MAP showed significant

  7. Protocol for the "Michigan Awareness Control Study": A prospective, randomized, controlled trial comparing electronic alerts based on bispectral index monitoring or minimum alveolar concentration for the prevention of intraoperative awareness

    Directory of Open Access Journals (Sweden)

    Avidan Michael S

    2009-11-01

    Full Text Available Abstract Background The incidence of intraoperative awareness with explicit recall is 1-2/1000 cases in the United States. The Bispectral Index monitor is an electroencephalographic method of assessing anesthetic depth that has been shown in one prospective study to reduce the incidence of awareness in the high-risk population. In the B-Aware trial, the number needed to treat in order to prevent one case of awareness in the high-risk population was 138. Since the number needed to treat and the associated cost of treatment would be much higher in the general population, the efficacy of the Bispectral Index monitor in preventing awareness in all anesthetized patients needs to be clearly established. This is especially true given the findings of the B-Unaware trial, which demonstrated no significant difference between protocols based on the Bispectral Index monitor or minimum alveolar concentration for the reduction of awareness in high risk patients. Methods/Design To evaluate efficacy in the general population, we are conducting a prospective, randomized, controlled trial comparing the Bispectral Index monitor to a non-electroencephalographic gauge of anesthetic depth. The total recruitment for the study is targeted for 30,000 patients at both low and high risk for awareness. We have developed a novel algorithm that is capable of real-time analysis of our electronic perioperative information system. In one arm of the study, anesthesia providers will receive an electronic page if the Bispectral Index value is >60. In the other arm of the study, anesthesia providers will receive a page if the age-adjusted minimum alveolar concentration is Discussion Awareness during general anesthesia is a persistent problem and the role of the Bispectral Index monitor in its prevention is still unclear. The Michigan Awareness Control Study is the largest prospective trial of awareness prevention ever conducted. Trial Registration Clinical Trial NCT00689091

  8. Dow's chemical exposure index guide

    International Nuclear Information System (INIS)

    Marshall, J.T.; Mundt, A.

    1995-01-01

    A number of events in the 1970's and 1980's impacted the course of process safety. Incidents such as Flixborough, Seveso, Three-Mile Island, and Bhopal are well known throughout industry and are recognized as examples of major disasters. Even though events leading up to these disasters were completely different they had one common element between them: a substance was released from a manufacturing unit, became airborne and presented a hazard of such magnitude as to place the safety of both employees and the surrounding public in jeopardy. As a result, industry became increasingly concerned regarding potential loss, in human and economic terms, as plants and equipment grew in size. The Flixborough incident raised the level of concern for process safety, particularly in terms of the hazards presented by fire and explosion. Seveso and Three-Mile Island emphasized the need to consider far-field exposure. The Bhopal incident created an urgent need to recognize and understand the expected downwind impact of potential releases of acutely toxic substances to the air. In order to meet this need, the Dow Chemical Company, a recognized leader in the area of safety and loss prevention, presented a Chemical Exposure Index in 1986. AIChE has recently published an updated version entitled Dow's Chemical Exposure Index Guide. 7 refs., 5 figs

  9. Characterization of Sleep Using Bispectral Analysis

    National Research Council Canada - National Science Library

    McPherson, Cameron

    2001-01-01

    This study investigated the relationship between a Bispectral Index (BIS), as measured by Aspect Medical Systems' A-1000 EEG monitor, and clinical sleep staging based on the Rechtschaffen and Kales (RK...

  10. Update on bispectral index monitoring.

    Science.gov (United States)

    Johansen, Jay W

    2006-03-01

    Since 1997, bispectral index (BIS; Aspect Medical Systems Inc., Natick, MA) has been in clinical practice and a wealth of experimental research has accumulated on its use. Originally, the device was approved only for monitoring hypnosis and has now received an indication for reducing the incidence of intraoperative awareness during anesthesia. Numerous studies have documented the ability of BIS to reduce intermediate outcomes such as hypnotic drug administration, extubation time, postoperative nausea and shortened recovery room discharge. Two recent large-scale outcome studies using BIS (one randomized controlled trial and one prospective, nonrandomized historical cohort study) identified an approximately 80% reduction in the incidence of recall after anesthesia. BIS provides clinicians with unique information that can be used to tailor hypnotic drug doses to individual patient requirements. BIS does not predict movement or hemodynamic response to stimulation, nor will it predict the exact moment consciousness returns. This review will also discuss other BIS applications including use in pediatrics, intensive care and for procedural sedation. Some limitations exist to the use of BIS and it is not useful for some individual hypnotic agents (ketamine, dexmedetomidine, nitrous oxide, xenon, opioids). BIS technology is moving out of the operating room and into diverse environments where conscious and deep sedation are provided. Anesthesiologists need to be actively involved in promoting patient safety and helping transition this technology into broader use.

  11. Discrete-continuous bispectral operators and rational Darboux transformations

    International Nuclear Information System (INIS)

    Boyallian, Carina; Portillo, Sofia

    2010-01-01

    In this Letter we construct examples of discrete-continuous bispectral operators obtained by rational Darboux transformations applied to a regular pseudo-difference operator with constant coefficients. Moreover, we give an explicit procedure to write down the differential operators involved in the bispectral situation corresponding to the pseudo-difference operator obtained by the Darboux process.

  12. Performance of the bispectral index during electrocautery.

    Science.gov (United States)

    Chan, Matthew T V; Ho, Sin Shing; Gin, Tony

    2012-01-01

    The electroencephalogram contains small electrical signals that are vulnerable to contamination from high-frequency noise during electrocautery. The bispectral index (BIS) monitor incorporated hardware and software changes to eliminate artifacts, thus allowing BIS monitoring even in the presence of electrocautery. We evaluated the accuracy of BIS to measure anesthetic effect during electrocautery interference. Anesthesia was induced and maintained with target-controlled infusions of propofol (3 μg/mL) and remifentanil (4 ng/mL). After baseline BIS recordings, "simulated" electrocautery interference was induced continuously for 20 minutes. Five minutes after the start of electrocautery, propofol infusion was increased to achieve an effect site concentration of 6 μg/mL. Patients remained undisturbed during the study. BIS values and signal quality index were recorded continuously. During electrocautery, there was a significant decrease in signal quality index (mean difference: 16.9; 95% confidence intervals: 15.9-17.9; Pelectrocautery, there was a prompt decrease in BIS (Pelectrocautery. Rejecting and filtering artifacts from electrocautery interference reduced the ability of BIS to respond to a change in anesthetic depth. BIS values during electrocautery should be interpreted with caution.

  13. MONITORING DEPTH OF ANAESTHESIA USING PRST SCORE AND BISPECTRAL INDEX

    OpenAIRE

    Rahul; Sowmya; Rangalakshmi; Roshan Kumar; Karthik

    2015-01-01

    BACKGROUND : Intraoperative awareness is a frightening experience for any patient for it has long term psychological consequences. Among the various tools available for monitoring depth of anaesthesia, Bispectral index monitoring (BIS) is one of the recent and widely accepted techniques. AIMS AND OBJECTIVES : The present study was carried out ...

  14. Nonlinear damage detection in composite structures using bispectral analysis

    Science.gov (United States)

    Ciampa, Francesco; Pickering, Simon; Scarselli, Gennaro; Meo, Michele

    2014-03-01

    Literature offers a quantitative number of diagnostic methods that can continuously provide detailed information of the material defects and damages in aerospace and civil engineering applications. Indeed, low velocity impact damages can considerably degrade the integrity of structural components and, if not detected, they can result in catastrophic failure conditions. This paper presents a nonlinear Structural Health Monitoring (SHM) method, based on ultrasonic guided waves (GW), for the detection of the nonlinear signature in a damaged composite structure. The proposed technique, based on a bispectral analysis of ultrasonic input waveforms, allows for the evaluation of the nonlinear response due to the presence of cracks and delaminations. Indeed, such a methodology was used to characterize the nonlinear behaviour of the structure, by exploiting the frequency mixing of the original waveform acquired from a sparse array of sensors. The robustness of bispectral analysis was experimentally demonstrated on a damaged carbon fibre reinforce plastic (CFRP) composite panel, and the nonlinear source was retrieved with a high level of accuracy. Unlike other linear and nonlinear ultrasonic methods for damage detection, this methodology does not require any baseline with the undamaged structure for the evaluation of the nonlinear source, nor a priori knowledge of the mechanical properties of the specimen. Moreover, bispectral analysis can be considered as a nonlinear elastic wave spectroscopy (NEWS) technique for materials showing either classical or non-classical nonlinear behaviour.

  15. Spin Calogero Particles and Bispectral Solutions of the Matrix KP Hierarchy

    International Nuclear Information System (INIS)

    Bergvelt, Maarten; Gekhtman, Michael; Kasman, Alex

    2009-01-01

    Pairs of nxn matrices whose commutator differ from the identity by a matrix of rank r are used to construct bispectral differential operators with rxr matrix coefficients satisfying the Lax equations of the Matrix KP hierarchy. Moreover, the bispectral involution on these operators has dynamical significance for the spin Calogero particles system whose phase space such pairs represent. In the case r = 1, this reproduces well-known results of Wilson and others from the 1990's relating (spinless) Calogero-Moser systems to the bispectrality of (scalar) differential operators

  16. Bispectral Index Monitoring: validity and utility in pediatric dentistry.

    Science.gov (United States)

    Goyal, Ashima; Mittal, Neeti; Mittal, Parteek; Gauba, K

    2014-01-01

    Reliable and safe provision of sedation and general anesthesia is dependent on continuous vigilance of patient's sedation depth. Failure to do so may result in unintended oversedation or undersedation. It is a common practice to observe sedation depth by applying subjective sedation scales and in case of general anesthesia, practitioner is dependent on vital sign assessment. The Bispectral Index System (BIS) is a recently introduced objective, quantitative, easy to use, and free from observer bias, and clinically useful tool to assess sedation depth and it precludes the need to stimulate the patient to assess his sedation level. The present article is an attempt to orient the readers towards utility and validity of BIS for sedation and general anesthesia in pediatric dentistry. In this article, we attempt to make the readers understand the principle of BIS, its variation across sedation continuum, its validity across different age groups and for a variety of sedative drugs.

  17. Closed loop control of sedation for colonoscopy using the Bispectral Index

    NARCIS (Netherlands)

    Leslie, K.; Absalom, A.; Kenny, G. N. C.

    Sixteen patients undergoing colonoscopy were sedated with propofol using a closed-loop control system guided by the Bispectral Index (BIS). Propofol administration, via a target-controlled infusion, was controlled by a proportional-integral-differential control algorithm. The median (range) propofol

  18. Bispectral methods of signal processing applications in radar, telecommunications and digital image restoration

    CERN Document Server

    Totsky, Alexander V; Kravchenko, Victor F

    2015-01-01

    By studying applications in radar, telecommunications and digital image restoration, this monograph discusses signal processing techniques based on bispectral methods. Improved robustness against different forms of noise as well as preservation of phase information render this method a valuable alternative to common power-spectrum analysis used in radar object recognition, digital wireless communications, and jitter removal in images.

  19. Transverse and polarization effects in index-guided vertical-cavity surface-emitting lasers

    International Nuclear Information System (INIS)

    Torre, M. S.; Masoller, C.; Mandel, Paul

    2006-01-01

    We study numerically the polarization dynamics of vertical-cavity surface-emitting lasers (VCSEL's) operating in the fundamental transverse mode. We use an extension of the spin-flip model that not only accounts for the vector nature of the laser field, but also considers spatial transverse effects. The model assumes two orthogonal, linearly polarized fields, which are coupled to two carrier populations, associated with different spin sublevels of the conduction and valence bands in the quantum-well active region. Spatial effects are taken into account by considering transverse profiles for the two polarizations, for the two carrier populations, and for the carrier diffusion. The optical profile is the LP 01 mode, suitable for describing index-guided VCSEL's with cylindrical symmetry emitting on the fundamental transverse mode for both polarizations. We find that in small-active-region VCSEL's, fast carrier diffusion induces self-sustained oscillations of the total laser output, which are not present in larger-area devices or with slow carrier diffusion. These self-pulsations appear close to threshold, and, as the injection current increases, they grow in amplitude; however, there is saturation and the self-pulsations disappear at higher injection levels. The dependence of the oscillation amplitude on various laser parameters is investigated, and the results are found to be in good qualitative agreement with those reported by Van der Sande et al. [Opt. Lett. 29, 53 (2004)], based on a rate-equation model that takes into account transverse inhomogeneities through an intensity-dependent confinement factor

  20. Bispectral experimental estimation of the nonlinear energy transfer in two-dimensional plasma turbulence

    DEFF Research Database (Denmark)

    Manz, P.; Ramisch, M.; Stroth, U.

    2008-01-01

    Experimental density and potential fluctuation data from a 2D probe array have been analysed to study the turbulent cascade in a toroidally confined magnetized plasma. The bispectral analysis technique used is from Ritz et al ( 1989 Phys. Fluids B 1 153) and Kim et al ( 1996 Phys. Plasmas 3 3998...... scales. This is the first experimental evidence for the dual turbulent cascade in a magnetized plasma....

  1. Prediction of Bispectral Index during Target-controlled Infusion of Propofol and Remifentanil: A Deep Learning Approach.

    Science.gov (United States)

    Lee, Hyung-Chul; Ryu, Ho-Geol; Chung, Eun-Jin; Jung, Chul-Woo

    2018-03-01

    The discrepancy between predicted effect-site concentration and measured bispectral index is problematic during intravenous anesthesia with target-controlled infusion of propofol and remifentanil. We hypothesized that bispectral index during total intravenous anesthesia would be more accurately predicted by a deep learning approach. Long short-term memory and the feed-forward neural network were sequenced to simulate the pharmacokinetic and pharmacodynamic parts of an empirical model, respectively, to predict intraoperative bispectral index during combined use of propofol and remifentanil. Inputs of long short-term memory were infusion histories of propofol and remifentanil, which were retrieved from target-controlled infusion pumps for 1,800 s at 10-s intervals. Inputs of the feed-forward network were the outputs of long short-term memory and demographic data such as age, sex, weight, and height. The final output of the feed-forward network was the bispectral index. The performance of bispectral index prediction was compared between the deep learning model and previously reported response surface model. The model hyperparameters comprised 8 memory cells in the long short-term memory layer and 16 nodes in the hidden layer of the feed-forward network. The model training and testing were performed with separate data sets of 131 and 100 cases. The concordance correlation coefficient (95% CI) were 0.561 (0.560 to 0.562) in the deep learning model, which was significantly larger than that in the response surface model (0.265 [0.263 to 0.266], P deep learning model-predicted bispectral index during target-controlled infusion of propofol and remifentanil more accurately compared to the traditional model. The deep learning approach in anesthetic pharmacology seems promising because of its excellent performance and extensibility.

  2. A bispectral q-hypergeometric basis for a class of quantum integrable models

    Science.gov (United States)

    Baseilhac, Pascal; Martin, Xavier

    2018-01-01

    For the class of quantum integrable models generated from the q-Onsager algebra, a basis of bispectral multivariable q-orthogonal polynomials is exhibited. In the first part, it is shown that the multivariable Askey-Wilson polynomials with N variables and N + 3 parameters introduced by Gasper and Rahman [Dev. Math. 13, 209 (2005)] generate a family of infinite dimensional modules for the q-Onsager algebra, whose fundamental generators are realized in terms of the multivariable q-difference and difference operators proposed by Iliev [Trans. Am. Math. Soc. 363, 1577 (2011)]. Raising and lowering operators extending those of Sahi [SIGMA 3, 002 (2007)] are also constructed. In the second part, finite dimensional modules are constructed and studied for a certain class of parameters and if the N variables belong to a discrete support. In this case, the bispectral property finds a natural interpretation within the framework of tridiagonal pairs. In the third part, eigenfunctions of the q-Dolan-Grady hierarchy are considered in the polynomial basis. In particular, invariant subspaces are identified for certain conditions generalizing Nepomechie's relations. In the fourth part, the analysis is extended to the special case q = 1. This framework provides a q-hypergeometric formulation of quantum integrable models such as the open XXZ spin chain with generic integrable boundary conditions (q ≠ 1).

  3. Quando o índice bispectral (BIS pode fornecer valores espúrios Cuando el índice bispectral (BIS puede suministrar valores falsos When the bispectral index (Bis can give false results

    Directory of Open Access Journals (Sweden)

    Leonardo Teixeira Domingues Duarte

    2009-02-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: O índice bispectral (BIS é um parâmetro multifatorial derivado do eletroencefalograma (EEG que permite a monitorização do componente hipnótico da anestesia. Foi obtido a partir de algoritmo derivado da análise de grande número de EEGs de voluntários e pacientes submetidos a sedações e anestesia geral com diferentes agentes anestésicos. Além de outros benefícios, o uso do BIS para monitorização da profundidade da anestesia reduz a ocorrência de despertar e memória intra-operatória. Esta revisão teve o objetivo de apresentar situações clínicas em que o BIS aponta valores espúrios, falsamente elevados ou reduzidos, em decorrência de condições do paciente ou ações de anestésicos não-previstos quando da elaboração do seu algoritmo. CONTEÚDO: Os valores do BIS podem sofrer alteração e influência em variadas situações clínicas em que há padrões anormais do EEG; efeito de diferentes anestésicos e outros fármacos não-incluídos na elaboração de seu algoritmo; interferência de equipamentos elétricos; bem como decorrentes de peculiaridades do monitor. CONCLUSÃO: Apesar de o algoritmo do BIS ter sofrido diversas alterações desde a sua primeira versão, essas situações que determinam variações espúrias dos valores do BIS devem ser reconhecidas pelo anestesiologista a fim de evitar complicações, sejam conseqüentes à sobredose anestésica, sejam por subdoses que poderão causar despertar e memória intra-operatória.JUSTIFICATIVA Y OBJETIVOS: El índice bispectral (BIS es un parámetro multifactorial derivado del electroencefalograma (EEG, que permite la monitorización del componente hipnótico de la anestesia. Fue obtenido a partir de algoritmo derivado del análisis de un gran número de EEG de voluntarios y pacientes sometidos a sedaciones y anestesia general con diferentes agentes anestésicos. Además de otros beneficios, el uso del BIS para la monitorización de la

  4. Response surface modeling of remifentanil-propofol interaction on cardiorespiratory control and bispectral index.

    Science.gov (United States)

    Nieuwenhuijs, Diederik J F; Olofsen, Erik; Romberg, Raymonda R; Sarton, Elise; Ward, Denham; Engbers, Frank; Vuyk, Jaap; Mooren, Rene; Teppema, Luc J; Dahan, Albert

    2003-02-01

    Since propofol and remifentanil are frequently combined for monitored anesthesia care, we examined the influence of the separate and combined administration of these agents on cardiorespiratory control and bispectral index in humans. The effect of steady-state concentrations of remifentanil and propofol was assessed in 22 healthy male volunteer subjects. For each subject, measurements were obtained from experiments using remifentanil alone, propofol alone, and remifentanil plus propofol (measured arterial blood concentration range: propofol studies, 0-2.6 microg/ml; remifentanil studies, 0-2.0 ng/ml). Respiratory experiments consisted of ventilatory responses to three to eight increases in end-tidal Pco2 (Petco2). Invasive blood pressure, heart rate, and bispectral index were monitored concurrently. The nature of interaction was assessed by response surface modeling using a population approach with NONMEM. Values are population estimate plus or minus standard error. A total of 94 responses were obtained at various drug combinations. When given separately, remifentanil and propofol depressed cardiorespiratory variables in a dose-dependent fashion (resting V(i) : 12.6 +/- 3.3% and 27.7 +/- 3.5% depression at 1 microg/ml propofol and 1 ng/ml remifentanil, respectively; V(i) at fixed Petco of 55 mmHg: 44.3 +/- 3.9% and 57.7 +/- 3.5% depression at 1 microg/ml propofol and 1 ng/ml remifentanil, respectively; blood pressure: 9.9 +/- 1.8% and 3.7 +/- 1.1% depression at 1 microg/ml propofol and 1 ng/ml remifentanil, respectively). When given in combination, their effect on respiration was synergistic (greatest synergy observed for resting V(i)). The effects of both drugs on heart rate and blood pressure were modest, with additive interactions when combined. Over the dose range studied, remifentanil had no effect on bispectral index even when combined with propofol (inert interaction). These data show dose-dependent effects on respiration at relatively low concentrations of

  5. [Pneumocephalus as a cause of a decrease in the bispectral index].

    Science.gov (United States)

    Herreras Gutiérrez, J L; Gilsanz Rodríguez, F

    2014-01-01

    A sharp decrease in the values of the bispectral index (BIS), along with an increase in suppression rate, was observed in a patient after the removal of an epidermoid tumor in the cerebellopontine angle by right retrosigmoid access under general anesthesia. This was probably related to a frontal pneumocephalus. No accompanying neurological signs were observed. The patient was extubated in the Recovery Room with no further incidents, as the BIS increased again. The neurosurgeons chose conservative treatment, relying on the reabsorption and redistribution of the air. Copyright © 2012 Sociedad Española de Anestesiología, Reanimación y Terapéutica del Dolor. Published by Elsevier España. All rights reserved.

  6. Capnography and the Bispectral Index—Their Role in Pediatric Sedation: A Brief Review

    Directory of Open Access Journals (Sweden)

    Maria Sammartino

    2010-01-01

    Full Text Available Sedation in children is increasingly emerging as a minimally invasive technique that may be associated with local anaesthesia or diagnostic and therapeutic procedures which do not necessarily require general anaesthesia. Standard monitoring requirements are not sufficient to ensure an effective control of pulmonary ventilation and deep sedation. Capnography in pediatric sedation assesses the effect of different drugs on the occurrence of respiratory failure and records early indicators of respiratory impairment. The Bispectral index (BIS allows the reduction of dose requirements of anaesthetic drugs, the reduction in the time to extubation and eye opening, and the reduction in the time to discharge. In the field of pediatric sedation, capnography should be recommended to prevent respiratory complications, particularly in spontaneous ventilation. The use of the BIS index, however, needs further investigation due to a lack of evidence, especially in infants. In this paper, we will investigate the role of capnography and the BIS index in improving monitoring standards in pediatric sedation.

  7. Bispectral analysis of nonlinear compressional waves in a two-dimensional dusty plasma crystal

    International Nuclear Information System (INIS)

    Nosenko, V.; Goree, J.; Skiff, F.

    2006-01-01

    Bispectral analysis was used to study the nonlinear interaction of compressional waves in a two-dimensional strongly coupled dusty plasma. A monolayer of highly charged polymer microspheres was suspended in a plasma sheath. The microspheres interacted with a Yukawa potential and formed a triangular lattice. Two sinusoidal pump waves with different frequencies were excited in the lattice by pushing the particles with modulated Ar + laser beams. Coherent nonlinear interaction of the pump waves was shown to be the mechanism of generating waves at the sum, difference, and other combination frequencies. However, coherent nonlinear interaction was ruled out for certain combination frequencies, in particular, for the difference frequency below an excitation-power threshold, as predicted by theory

  8. Electroconvulsive Therapy Under General Anesthesia With Cisatracurium, Laryngeal Mask Airways, and Bispectral Index.

    Science.gov (United States)

    Liu, Cai-Cai; Qian, Xiao-Yan; An, Jian-Xiong; Yu, Zeng-Lei; Wu, Jian-Ping; Wen, Hui; Cao, Zong-Xin; Wang, Yong; Fang, Qi-Wu; Williams, John P

    2016-03-01

    Electroconvulsive therapy (ECT) has dramatically reduced musculoskeletal complications when carried out with muscle relaxants under general anesthesia. However, seizure quality can be affected by the depth of anesthesia and choice of anesthetic agent. The purpose of this study was to describe a general anesthetic technique for ECT by using laryngeal mask, bispectral index (BIS), and muscle relaxant monitoring. Twenty-one patients, between ages 18 and 70 years (American Society of Anesthesiologists physical status I-III), who underwent a total of 89 sessions of ECT were examined in a retrospective study. Anesthesia was induced by use of propofol (1.0 mg/kg) followed by cisatracurium (0.2 mg/kg). The BIS, train-of-four, and end-tidal carbon dioxide were all monitored continuously. A laryngeal mask airway was used to maintain and protect the airway during the procedure. Electroconvulsive therapy stimuli were applied bilaterally when the train-of-four was assessed as being zero and BIS scores were 70. All patients then received 5 μg sufentanil and 2 mg midazolam, while titrated to maintain the BIS value at 40 to 50, before the muscle relaxation exhibited complete recovery. The mean duration of treatment process takes approximately 82.5 minutes. Mean (SD) seizure length was 58.8 (28.3) seconds, with 4.5% incidence of restimulation per treatment. Incidence of awareness was 0%. No patients exhibited delirium, nausea, vomiting, or myalgia in the postseizure phase. Bispectral index monitoring of the depth of anesthesia may have improved seizure quality, and awareness did not occur.

  9. Changes to the bispectral index and regional cerebral blood flow in a sedative state, caused by midazolam administration

    OpenAIRE

    池田, 淳子; イケダ, ジュンコ; Junko, IKEDA

    2006-01-01

    Psychosedation, as used in the field of dentistry, is intended to provide trouble-free dental care while maintaining a proper level of sedation. One drug used in psychosedation is midazolam, which is known to have a strong amnestic effect. In the current research, I sought to clarify whether the bispectral index (BIS) using EEC analysis can be used for assessment of optimal sedation in psychosedation, and what effects midazolam has on the cerebrum's mechanism of memory. The subjects were 17 h...

  10. Benefit of general anesthesia monitored by bispectral index compared with monitoring guided only by clinical parameters. Systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Carlos Rogério Degrandi Oliveira

    Full Text Available Abstract Background: The bispectral index parameter is used to guide the titration of general anesthesia; however, many studies have shown conflicting results regarding the benefits of bispectral index monitoring. The objective of this systematic review with meta-analysis is to evaluate the clinical impact of monitoring with the bispectral index parameter. Methods: The search for evidence in scientific information sources was conducted during December 2013 to January 2015, the following primary databases: Medline/PubMed, LILACS, Cochrane, CINAHL, Ovid, SCOPUS and TESES. The criteria for inclusion in the study were randomized controlled trials, comparing general anesthesia monitored, with bispectral index parameter with anesthesia guided solely by clinical parameters, and patients aged over 18 years. The criteria for exclusion were studies involving anesthesia or sedation for diagnostic procedures, and intraoperative wake-up test for surgery of the spine. Results: The use of monitoring with the bispectral index has shown benefits reducing time to extubation, orientation in time and place, and discharge from both the operating room and post anesthetic care unit. The risk of nausea and vomiting after surgery was reduced by 12% in patients monitored with bispectral index. Occurred a reduction of 3% in the risk of cognitive impairment postoperatively at 3 months postoperatively and 6% reduction in the risk of postoperative delirium in patients monitored with bispectral index. Furthermore, the risk of intraoperative memory has been reduced by 1%. Conclusion: Clinically, anesthesia monitoring with the BIS can be justified because it allows advantages from reducing the recovery time after waking, mainly by reducing the administration of general anesthetics as well as the risk of adverse events.

  11. [Application of bispectral index monitoring in sedation and analgesia for flexible bronchoscopy].

    Science.gov (United States)

    Fang, S R; Liu, Y J; Su, N J; Shu, Y; Gu, W

    2017-12-12

    Objective: To investigate the feasibility of using bispectral index monitoring in sedation and analgesia for bronchoscopy. Methods: Totally 285 patients admitted to the Respiratory Medicine Department of Nanjing First Hospital for bronchoscopy between June 2016 and December 2016 were assigned, according to their own wishes, into a conscious sedation group (171 cases receiving local anesthesia and conscious sedation, 89 males, 82 females, mean age 59±10 years) and a control group (114 cases undergoing local anesthesia, 59 males, 55 females, average age 61±12 years). The 2 groups were compared in terms of operation time, blood pressure, heart rate and other indicators during bronchoscopy including incidence of adverse events, memory of the procedure, willingness to be re-examined, safety of sedation and analgesia for bronchoscopy under bispectral index monitoring, and patient satisfaction in the postoperative follow-up. Results: The conscious sedation group and the control group had no difference in age and sex ratio( P >0.05). Compared with the patients in the control group(operation time 16±5 min and systolic blood pressure 153±21 mmHg, 1 mmHg=0.133 kPa), those in the conscious sedation group had a shorter operation time(14±5 min) and a lower systolic blood pressure(144±22 mmHg), with statistically significant difference ( P sedation group and 92±12 mmHg and 87±14 times/min in the control group, P >0.05). Adverse events, overall intraoperative cough and bleeding were found to be significantly reduced in the conscious sedation group (27%, 4% and 13% and 60%, 13% and 35% in the control group, P sedation group, and 14% in the control group, P =0.72). Patient satisfaction and willingness to be re-examined were markedly higher in the conscious sedation group (97%) than in the controls (4%, P sedation and analgesia for bronchoscopy and has higher patient satisfaction, suggesting that it is a potential tool for use in clinical practice.

  12. [Monitoring depth of anesthesia: a comparision between electroencephalographic nonlinear index and bispectral index].

    Science.gov (United States)

    Yu, Hai; Yang, Xiao-Yun; Zhu, Da; Du, Run-Zi; Yin, Yan; Zhou, Rong-Hua; Liu, Bin

    2010-01-01

    To compare the efficiency and accuracy of electroencephalographic nonlinear index (ENI) and bispectral index (BIS) in monitoring depth of anesthesia during general anesthesia. Thirty patients undergoing elective abdominal surgery were recruited. The ability of ENI and BIS to distinguish between the anesthetic states (awake, loss of eyelash reflex, loss of response, steady anesthesia, first reaction and extubation) was analyzed with prediction probability (Pk). Correlation between ENI and BIS was tested by nonparametric Spearman rank correlation analysis, with data paired from awake through to extubation. The clinical performances of ENI and BIS were evaluated with success rate, responsiveness, and recovery time. ENI and BIS were better than mean arterial pressure (MAP) and heart rate (HR) for distinguishing between the states of anesthesia. ENI correlated strongly with BIS from the stage of awake through to extubation (r = 0.93). No differences were found between ENI and BIS in success rate and responsiveness; but the recovery time was shorter with ENI than with BIS. ENI and BIS provide similar information reflecting the states of anesthesia, which allows accurate distinguishment between different states of anesthesia. The clinical performance of ENI is better than that of BIS.

  13. Lower Bispectral index values in psychiatric patients: A prospective, observational study

    Directory of Open Access Journals (Sweden)

    Venkatapura J Ramesh

    2014-01-01

    Full Text Available Background : Bispectral index score (BIS is a processed electroencephalographic parameter used to measure level of sedation in anaesthetised patients. In few studies of psychiatric patients undergoing electroconvulsive therapy (ECT, it was observed that the BIS values were lower at baseline. It is not clear from those studies whether the BIS values are really low. Also, it is not clear whether the lower values are related to the primary psychiatric illness or the due to the effect of ECT. Therefore, we studied the BIS values in psychiatric illnesses and compared them with the normal controls. Materials and Methods : BIS index was recorded in 237 patients with various psychiatric illness (Group P and 40 control patients without any psychiatric illness undergoing spinal surgery (Group C. BIS values were recorded in supine position before breakfast and before the morning doses of antipsychotic/benzodiazepine medications. It was recorded during resting state in all the subjects. Results : BIS values were lower in group P compared to control group (a mean of 89.8 ± 7.8 vs 95.7 ± 2.4, P < 0.0001. In the group P, the patients with psychosis and bipolar disorder had significantly lower BIS values than the patients with depression (P = 0.04. Conclusions : BIS values in psychiatric patients are lower than those in the control group. Psychotic and bipolar disorders are associated with significantly lower BIS values than the depression.

  14. Bispectral analysis of harmonic oscillations measured using beam emission spectroscopy and magnetic probes in CHS

    International Nuclear Information System (INIS)

    Oishi, Tetsutarou; Yoshinuma, Mikirou; Ida, Katsumi; Akiyama, Tsuyoshi; Minami, Takashi; Nagaoka, Kenichi; Shimizu, Akihiro; Okamura, Shoichi; Kado, Shinichiro

    2008-01-01

    The coherent MHD oscillation, which consists of the fundamental frequency of several kilohertz and its higher harmonics, (harmonic oscillation: HO) has been observed in Compact Helical System. HO consists of two pairs of harmonic series. One is located in the core region near the ι=0.5 rational surface (denoted as 'HO (core)'), the other is located in the edge region near the ι=1.0 rational surface (denoted as 'HO (edge)'). In the present study, bispectral analysis is applied to the fluctuation data, for which HO is measured by beam emission spectroscopy (BES) and using magnetic probes. The analysis has revealed that fundamental mode of HO in both the magnetic and core density fluctuations have phase correlation with the harmonics including fundamental oscillation, while HO in edge density fluctuation does not have such phase correlation. Mode numbers of HOs are identical for harmonic components having different frequencies, i.e., m/n=-2/1 for HO (core) and m/n=-1/1 for HO (edge). It suggests that the generation of harmonics cannot be interpreted simply as mode coupling because the summation rule for the wavenumber is not satisfied, even though the bicoherence value is significant. The bicoherence value and relative amplitude of higher harmonics correlate with each other, which suggests that bicoherence indicates the degree of distortion of the signals. (author)

  15. Effect of relaxation on working memory and the Bispectral Index of the EEG.

    Science.gov (United States)

    Hudetz, Judith A; Hudetz, Anthony G; Reddy, Diane M

    2004-08-01

    Beneficial effects of relaxation on cardiovascular and immune functions and on memory has been implied but an empirical relationship between task performance and anxiety reduction has not been reported. In this study, we investigated whether guided imagery of relatively short duration would decrease S-Anxiety and electroencephalogram Bispectral Index and improve working memory. 42 participants (age: M=39, SD=11, 14 men, 28 women, university students and VA Medical Center employees, recruited by their professor or by fellow employees) underwent relaxation by 16-min. guided imagery or no treatment (control). Spielberger's State-Trait Anxiety Inventory and the WAIS-III Letter-Number Sequencing Test were administered before and after relaxation. S-Anxiety and BIS Index decreased and the Letter-Number test score increased by 30% after relaxation but not in the control group. This score was higher for participants with low anxiety and BIS Index. There was no significant difference between the groups before treatment. The results suggest that guided imagery of short duration produces relaxation as measured by psychological and neurophysiological indices and improves working memory performance.

  16. Bispectral index monitoring for conscious sedation in intervention: better, safer, faster

    Energy Technology Data Exchange (ETDEWEB)

    Bell, J.K.; Laasch, H.-U.; Wilbraham, L.; England, R.E.; Morris, J.A.; Martin, D.F. E-mail: derrick.martin@smtr.nhs.uk

    2004-12-01

    AIM: The aim of this study was to compare subjective (Ramsay sedation score, RSS) with objective electroencephalogram-based bispectral index (BIS) assessment, and to validate the appropriate BIS range for measurement of conscious sedation in interventional procedures. MATERIALS AND METHODS: One hundred patients undergoing sedo-analgesia (midazolam and fentanyl) for interventional gastrointestinal procedures were divided into two groups. In group A (n=30) sedation was guided by the RSS with the operator blinded to the BIS recording. In group B (n=70) the operator titrated intravenous sedation to maintain an optimal BIS, predetermined from the results in group A. Recovery time, procedure duration, physiological parameters and unplanned events were recorded in both groups. RESULTS: There was a significant correlation between the BIS and RSS (p<0.001). BIS values of 87.2 and 80.9 corresponded to an RSS of 3 and 4, respectively. The optimal BIS level was defined as 80-85. Fifty-seven point five percent of readings were within this range in group B compared with 26.5% in group A (p<0.001). Sedation approaching general anaesthesia (BIS<60) occurred in 5.5% of patients in group A but not in group B. Mean recovery time, duration of procedure, midazolam and fentanyl doses were significantly reduced in group B. Unplanned events were reduced from 27 to 17%, but this was not statistically significant (p=0.29). CONCLUSION: BIS monitoring enables more effective titration of sedatives to maintain a suitable level of consciousness, whilst reducing procedure time. The BIS offers an objective, safe and reliable measure of sedation, without disturbing either patient or operator. BIS monitoring raises the standard of patient care, and in our view, should be used to augment standard assessment.

  17. Bispectral Index monitoring in cancer patients undergoing palliative sedation: a preliminary report.

    Science.gov (United States)

    Monreal-Carrillo, Edith; Allende-Pérez, Silvia; Hui, David; García-Salamanca, Maria-Fernanda; Bruera, Eduardo; Verástegui, Emma

    2017-10-01

    Continuous palliative sedation (PS) is currently titrated based on clinical observation; however, it is often unclear if patients are still aware of their suffering. The aim of this prospective study is to characterize the level of consciousness in patients undergoing PS using Bispectral Index (BIS) monitoring. We enrolled consecutive patients with refractory symptoms requiring PS. We documented the level of sedation using Ramsay Sedation Scale (RSS) and BIS at 0, 2, 4, 6, 12, and 24 h during the first day of PS and examined their degree of association. Intravenous midazolam or propofol was titrated according to the sedation level. Twenty patients on PS were recruited and had BIS continuous monitoring. Delirium was the most frequent reason for PS (n = 15, 75%). The median time of sedation was 24.5 h (interquartile range 6-46). The average time to achieve the desired sedation level was 6 h, and dose titration was required in 80% of the cases. At baseline, 14 (70%) patients were considered to be awake according to RSS (i.e., 1-3) and 19 (95%) were awake according to BIS (i.e., >60%). This proportion decreased to 31 and 56% at 4 h, 27% and 53 at 6 h, and 22 and 33% at 24 h. RS and BIS had moderate correlation (rho = -0.58 to -0.65); however, a small proportion of patients were found to be awake by BIS (i.e., ≥60%) despite clinical observation (i.e., RSS 4-6) indicating otherwise. The BIS is a noninvasive, bedside, real-time continuous monitoring method that may facilitate the objective assessment of level of consciousness and dose titration in patients undergoing PS.

  18. Comparison of Bispectral Index and Entropy values with electroencephalogram during surgical anaesthesia with sevoflurane.

    Science.gov (United States)

    Aho, A J; Kamata, K; Jäntti, V; Kulkas, A; Hagihira, S; Huhtala, H; Yli-Hankala, A

    2015-08-01

    Concomitantly recorded Bispectral Index® (BIS) and Entropy™ values sometimes show discordant trends during general anaesthesia. Previously, no attempt had been made to discover which EEG characteristics cause discrepancies between BIS and Entropy. We compared BIS and Entropy values, and analysed the changes in the raw EEG signal during surgical anaesthesia with sevoflurane. In this prospective, open-label study, 65 patients receiving general anaesthesia with sevoflurane were enrolled. BIS, Entropy and multichannel digital EEG were recorded. Concurrent BIS and State Entropy (SE) values were selected. Whenever BIS and SE values showed ≥10-unit disagreement for ≥60 s, the raw EEG signal was analysed both in time and frequency domain. A ≥10-unit disagreement ≥60 s was detected 428 times in 51 patients. These 428 episodes accounted for 5158 (11%) out of 45 918 analysed index pairs. During EEG burst suppression, SE was higher than BIS in 35 out of 49 episodes. During delta-theta dominance, BIS was higher than SE in 141 out of 157 episodes. During alpha or beta activity, SE was higher than BIS in all 49 episodes. During electrocautery, both BIS and SE changed, sometimes in the opposite direction, but returned to baseline values after electrocautery. Electromyography caused index disagreement four times (BIS > SE). Certain specific EEG patterns, and artifacts, are associated with discrepancies between BIS and SE. Time and frequency domain analyses of the original EEG improve the interpretation of studies involving BIS, Entropy and other EEG-based indices. NCT01077674. © The Author 2015. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Comparison of Hemodynamic Variations, Bispectral Index and Myoclonus Score of Propofol Dosage in Anesthesia Induced Patients

    Directory of Open Access Journals (Sweden)

    Gh. Shabanian

    2016-09-01

    Full Text Available Aims: Propofol is the most widely used intravenous anesthetic medication. It is necessary to assess the doses of the medication to determine proper anesthetic depth and to prevent its side-effects. The aim of this study was to compare 1 and 2.5mg/Kg doses of propofol in hemodynamic changes, myoclonus degree, and bi-spectral index (BIS monitoring level in patients under anesthetic induction. Materials & Methods: In the two-blind random clinical trial study, 92 patients being candidate for surgery wit general anesthesia induction were studied in Shahr-e Kord Kashani Center in 2013. The subjects, selected via simple sampling method, were randomly divided into two groups. The first and the second groups were received 1 and 2.5mg/kg doses of propofol, respectively. Hemodynamic, myoclonus, and BIS indices were measured at four different times in the groups. Data was analyzed by SPSS 17 using independent T and Chi-square tests, as well as repeated ANOVA and Fisher’s test. Findings: There was no significant difference between the groups in the hemodynamic variables such as systolic and diastolic blood pressure, mean arterial blood pressure, pulse rate, and BIS (p>0.05. In addition, the change rates of the variables were the same. Nevertheless, there was a significant difference between the groups in the pulse change rate (p=0.032. There was no significant difference between the groups in myoclonus (p>0.05. Conclusion: The hemodynamic changes and the changes in myoclonus degree and BIS are the same in 1 and 2.5mg/kg doses of propofol in the patients undergoing anesthetic induction.

  20. Bispectral index monitoring for conscious sedation in intervention: better, safer, faster

    International Nuclear Information System (INIS)

    Bell, J.K.; Laasch, H.-U.; Wilbraham, L.; England, R.E.; Morris, J.A.; Martin, D.F.

    2004-01-01

    AIM: The aim of this study was to compare subjective (Ramsay sedation score, RSS) with objective electroencephalogram-based bispectral index (BIS) assessment, and to validate the appropriate BIS range for measurement of conscious sedation in interventional procedures. MATERIALS AND METHODS: One hundred patients undergoing sedo-analgesia (midazolam and fentanyl) for interventional gastrointestinal procedures were divided into two groups. In group A (n=30) sedation was guided by the RSS with the operator blinded to the BIS recording. In group B (n=70) the operator titrated intravenous sedation to maintain an optimal BIS, predetermined from the results in group A. Recovery time, procedure duration, physiological parameters and unplanned events were recorded in both groups. RESULTS: There was a significant correlation between the BIS and RSS (p<0.001). BIS values of 87.2 and 80.9 corresponded to an RSS of 3 and 4, respectively. The optimal BIS level was defined as 80-85. Fifty-seven point five percent of readings were within this range in group B compared with 26.5% in group A (p<0.001). Sedation approaching general anaesthesia (BIS<60) occurred in 5.5% of patients in group A but not in group B. Mean recovery time, duration of procedure, midazolam and fentanyl doses were significantly reduced in group B. Unplanned events were reduced from 27 to 17%, but this was not statistically significant (p=0.29). CONCLUSION: BIS monitoring enables more effective titration of sedatives to maintain a suitable level of consciousness, whilst reducing procedure time. The BIS offers an objective, safe and reliable measure of sedation, without disturbing either patient or operator. BIS monitoring raises the standard of patient care, and in our view, should be used to augment standard assessment

  1. Can bispectral index or auditory evoked potential index predict implicit memory during propofol-induced sedation?

    Science.gov (United States)

    Wang, Yun; Yue, Yun; Sun, Yong-hai; Wu, An-shi

    2006-06-05

    Some patients still suffer from implicit memory of intraoperative events under adequate depth of anaesthesia. The elimination of implicit memory should be a necessary aim of clinical general anaesthesia. However, implicit memory cannot be tested during anaesthesia yet. We propose bispectral index (BIS) and auditory evoked potential index (AEPI), as predictors of implicit memory during anaesthesia. Thirty-six patients were equally divided into 3 groups according to the Observer's Assessment of Alertness/Sedation Score: A, level 3; B, level 2; and C, level 1. Every patient was given the first auditory stimulus before sedation. Then every patient received the second auditory stimulus after the target level of sedation had been reached. BIS and AEPI were monitored before and after the second auditory stimulus presentation. Four hours later, the inclusion test and exclusion test were performed on the ward using process dissociation procedure and the scores of implicit memory estimated. In groups A and B but not C, implicit memory estimates were statistically greater than zero (P memory scores in group A did not differ significantly from those in group B (P > 0.05). Implicit memory scores correlated with BIS and AEPI (P AEPI. The 95% cutoff points of BIS and AEPI for predicting implicit memory are 47 and 28, respectively. Implicit memory does not disappear until the depth of sedation increases to level 1 of OAA/S score. Implicit memory scores correlate well with BIS and AEPI during sedation. BIS is a better index for predicting implicit memory than AEPI during propofol induced sedation.

  2. Bispectral Index Monitoring Reduces the Dosage of Propofol and Adverse Events in Sedation for Endobronchial Ultrasound.

    Science.gov (United States)

    Quesada, Natividad; Júdez, Diego; Martínez Ubieto, Javier; Pascual, Ana; Chacón, Enrique; De Pablo, Francisco; Mincholé, Elisa; Bello, Salvador

    2016-01-01

    Current guidelines recommend monitoring the anesthetic depth of sedation during respiratory endoscopy by using clinical scales despite their subjective nature and the potential change in the level of sedation caused by frequent stimulation. Monitoring by means of the bispectral index (BIS) has shown its utility in reducing the use of drugs and their adverse events in general anesthesia, but evidence in prolonged sedation is insufficient. Our objective was to evaluate BIS in patients undergoing endobronchial ultrasound (EBUS). A randomized cohort study of 90 patients with mediastinal lymph node involvement and/or lung or mediastinal lesions for whom EBUS was indicated, comparing the modified observer's assessment of alertness/sedation scale clinical evaluation (n = 45) versus the BIS evaluation (n = 45) of sedation with propofol-remifentanil, was conducted in order to evaluate the clinical parameters, doses used, adverse events, and tolerance of the procedure. We found a shorter waking time and a significantly lower dose of total propofol in the BIS group. Significantly fewer overall adverse events were recorded in the BIS group and included desaturation, hypotension, and bradypnea. Tolerance was better in the BIS group. No significant differences were found in terms of cough, memory of the procedure, or the level of difficulty of EBUS on the part of the pulmonologists. BIS monitoring of sedation in EBUS makes it possible to reduce the dosage of propofol, thereby shortening the waking time and reducing adverse events. This form of monitoring should be taken into consideration in the future for systematic use in prolonged sedation, as in the case of EBUS. © 2016 S. Karger AG, Basel.

  3. Correlation of bispectral index (BIS monitoring and end-tidal sevoflurane concentration in a patient with lobar holoprosencephaly

    Directory of Open Access Journals (Sweden)

    Dario Galante

    2015-10-01

    Full Text Available ABSTRACTOBJECTIVE: The bispectral index (BIS is a parameter derived by electroencephalography (EEG which provides a direct measurement of the effects of sedatives and anesthetics on the brain and offers guidance on the adequacy of anesthesia. The literature lacks studies on BIS monitoring in pediatric patients with congenital brain disease undergoing general anesthesia.CLINICAL FEATURES: A 13-year-old child weighing 32 kg, suffering from lobar holoprosencephaly, underwent surgery in which the bispectral index (BIS monitoring the depth of anesthesia showed an abnormal response. Detailed analysis of the trends of BIS values in the different observation times demonstrated sudden falls and repetitive values of BIS likely related to repetitive epileptiform electrical activity caused by sevoflurane.CONCLUSION: The BIS is a very useful monitoring tool for assessing the degree of depth of anesthesia and to analyze the electroencephalographic variations of anesthetics. Particular attention should be given to patients with congenital disorders of the central nervous system in which the BIS may give abnormal responses that do not reflect an accurate assessment of the depth of anesthesia.

  4. Correlation of bispectral index (BIS monitoring and end-tidal sevoflurane concentration in a patient with lobar holoprosencephaly

    Directory of Open Access Journals (Sweden)

    Dario Galante

    2015-09-01

    Full Text Available Objective: The bispectral index (BIS is a parameter derived by electroencephalography (EEG which provides a direct measurement of the effects of sedatives and anesthetics on the brain and offers guidance on the adequacy of anesthesia. The literature lacks studies on BIS monitoring in pediatric patients with congenital brain disease undergoing general anesthesia. Clinical features: A 13-year-old child weighing 32 kg, suffering from lobar holoprosencephaly, underwent surgery in which the bispectral index (BIS monitoring the depth of anesthesia showed an abnormal response. Detailed analysis of the trends of BIS values in the different observation times demonstrated sudden falls and repetitive values of BIS likely related to repetitive epileptiform electrical activity caused by sevoflurane. Conclusion: The BIS is a very useful monitoring tool for assessing the degree of depth of anesthesia and to analyze the electroencephalographic variations of anesthetics. Particular attention should be given to patients with congenital disorders of the central nervous system in which the BIS may give abnormal responses that do not reflect an accurate assessment of the depth of anesthesia. Resumo: Objetivo: O índice bispectral (BIS é um parâmetro derivado por eletroencefalografia (EEG que fornece uma medida direta dos efeitos de sedativos e anestésicos no cérebro e orientação sobre a adequação da anestesia. A literatura carece de estudos sobre a monitoração do BIS em pacientes pediátricos com doença cerebral congênita submetidos à anestesia geral. Características clínicas: Criança de 13 anos de idade, pesando 32 kg, com holoprosencefalia lobar, foi submetida à cirurgia em que a monitoração da profundidade da anestesia com o uso do BIS mostrou uma resposta anormal. A análise detalhada das tendências dos valores do BIS nos diferentes tempos de observação mostrou quedas súbitas e valores repetitivos do BIS, provavelmente relacionados

  5. The accuracy and clinical feasibility of a new Bayesian-based closed-loop control system for propofol administration using the bispectral index as a controlled variable

    NARCIS (Netherlands)

    De Smet, Tom; Struys, Michel M. R. F.; Neckebroek, Martine M.; Van den Hauwe, Kristof; Bonte, Sjoert; Mortier, Eric P.

    2008-01-01

    BACKGROUND: Closed-loop control of the hypnotic component of anesthesia has been proposed in an attempt to optimize drug delivery. Here, we introduce a newly developed Bayesian-based, patient-individualized, model-based, adaptive control method for bispectral index (BIS) guided propofol infusion

  6. Comparison of a new composite index based on midlatency auditory evoked potentials and electroencephalographic parameters with bispectral index (BIS) during moderate propofol sedation.

    Science.gov (United States)

    Hadzidiakos, D; Petersen, S; Baars, J; Herold, K; Rehberg, B

    2006-11-01

    Derived parameters of the electroencephalogram and auditory evoked potentials can be used to determine depth of anaesthesia and sedation. However, it is not known whether any parameter can identify the occurrence of awareness in individual patients. We have compared the performance of bispectral index and a new composite index derived from auditory evoked potentials and the electroencephalogram (AAI 1.61) in predicting consciousness, explicit and implicit memory during moderate sedation with propofol. Twenty-one patients with spinal anaesthesia received intraoperatively propofol at the age-corrected C(50) for loss of consciousness and were presented test words via headphones. Bispectral index and AAI 1.61 (auditory evoked potentials, AEP-Monitor2) were recorded in parallel as well as the Observer's Assessment of Alertness/Sedation-score. Postoperatively, testing for explicit and implicit memory formation was performed. Bispectral index and AAI 1.61 correlated well with loss of consciousness defined by an Observer's Assessment of Alertness/Sedation-score of 2 (identical P(K) of 0.87), but did not allow a prediction of postoperative explicit or implicit recall. Both bispectral index and AAI may be indices of depth of sedation rather than indicators of memory formation, which persists during propofol sedation even after loss of consciousness.

  7. Response surface modeling of alfentanil-sevoflurane interaction on cardiorespiratory control and bispectral index.

    Science.gov (United States)

    Dahan, A; Nieuwenhuijs, D; Olofsen, E; Sarton, E; Romberg, R; Teppema, L

    2001-06-01

    Respiratory depression is a serious side effect of anesthetics and opioids. The authors examined the influence of the combined administration of sevoflurane and alfentanil on ventilatory control, heart rate (HR), and Bispectral Index (BIS) in healthy volunteers. Step decreases in end-tidal partial pressure of oxygen from normoxia into hypoxia (approximately 50 mmHg) at constant end-tidal partial pressure of carbon dioxide (approximately 48 mmHg) were performed in nine male volunteers at various concentrations of alfentanil and sevoflurane, ranging from 0 to 50 ng/ml for alfentanil and from 0 to 0.4 end-tidal concentration (ET%) for sevoflurane, and with various combinations of alfentanil and sevoflurane. The alfentanil-sevoflurane interactions on normoxic resting (hypercapnic) ventilation (Vi), HR, hypoxic Vi, and HR responses and BIS were assessed by construction of response surfaces that related alfentanil and sevoflurane to effect using a population analysis. Concentration-effect relations were linear for alfentanil and sevoflurane. Synergistic interactions were observed for resting Vi and resting HR. Depression of Vi by 25% occurred at 38 +/- 11 ng/ml alfentanil (population mean +/- SE) and at 0.7 +/- 0.4 ET% sevoflurane. One possibility for 25% reduction when alfentanil and sevoflurane are combined is 13.4 ng/ml alfentanil plus 0.12 ET% sevoflurane. Additive interactions were observed for hypoxic Vi and HR responses and BIS. Depression of the hypoxic Vi response by 25% occurred at 16 +/- 1 ng/ml alfentanil and 0.14 +/- 0.05 ET% sevoflurane. The effect of sevoflurane on the BIS (25% reduction of BIS occurred at 0.45 +/- 0.08 ET%) was independent of the alfentanil concentration. Response surface modeling was used successfully to analyze the effect of interactions between two drugs on respiration. The combination of alfentanil and sevoflurane causes more depression of Vi and HR than does the summed effect of each drug administered separately. The effects of

  8. Effect of rocuronium on the bispectral index under anesthesia and tracheal intubation.

    Science.gov (United States)

    Yue, Hui; Han, Jinyu; Liu, Ling; Wang, Kaiyuan; Li, Jincheng

    2016-12-01

    The aim of the present study was to investigate the effect of various doses of rocuronium on bispectral index (BIS) responses to propofol induction and tracheal intubation, as well as the role of the non-depolarization muscle relaxant rocuronium on the depth of sedation. A total of 72 patients (American Society of Anesthesiologists physical status I-II) were anaesthetized with propofol using a target-controlled infusion, and randomly divided into two sedation level groups (n=36). The patients were divided into 2 groups according to the BIS value: A normal sedation group (group 1), with a stable BIS value at 40-60, and a deep sedation group (group 2), with a BIS value rocuronium (0.3, 0.6, 0.9 and 1.2 mg/kg). Tracheal intubation was performed after 2 min of rocuronium administration. BIS, electromyography (EMG), heart rate (HR) and mean arterial pressure (MAP) were recorded continuously and averaged over 1 min during baseline (T1), steady state (T2), 2 min after rocuronium infusion (T3), and 0, 2 and 5 min after tracheal intubation. The results demonstrated that HR and MAP decreased significantly at T2 and T3 compared with T1. Following tracheal intubation (L0), HR and MAP significantly increased compared with T2 and T3, and returned to levels similar to those prior to intubation after 5 min. In group 1C and 1D, BIS was significantly decreased at T3 compared with T2; BIS was significantly increased at L0 compared with T3 in group 1A and 1B. EMG at earlier stages of anesthesia was significantly higher compared with other points, and was significantly increased at L0 compared with T3 in group 1A and 1B. These results demonstrated that BIS response may be associated with the dosage of rocuronium in the normal sedation group, although no association was observed with the deep sedation group. Tracheal intubation resulted in marked hemodynamic changes under both normal and deep sedation.

  9. Comparison of bispectral index and entropy monitoring in patients undergoing internalisation of deep brain stimulators

    Directory of Open Access Journals (Sweden)

    Suparna Bharadwaj

    2016-01-01

    Full Text Available Introduction: Depth of anaesthesia (DOA monitors are shown to reduce the intra-operative dose of anaesthetic agents, provide haemodynamic stability and shorten emergence times. Electroencephalography (EEG based DOA monitors such as bispectral index (BIS and entropy have been calibrated and validated in healthy subjects. Hence the clinical effectiveness of these monitors may be affected when monitoring patients with neurological disorders (e.g., epilepsy, dystonia, dementia and Parkinson's disease. The aim of this study was to determine whether BIS and entropy correlate with each other and with clinical indices of DOA in patients with movement disorders under general anaesthesia (GA. Materials and Methods: We conducted a prospective, observational study in patients with movement disorders undergoing internalization of deep brain stimulators. All patients received standard GA with age-adjusted mean alveolar concentration (aaMAC of an inhalational agent between 0.7 and 1.1. BIS and entropy sensors were applied on the patient's left forehead. Data collected included clinical parameters and EEG-based DOA indices. Correlation analysis was performed between entropy, BIS and the clinical indices of DOA. Bland Altman analysis was performed to determine the agreement between BIS and entropy. Results: Thirty patients were studied (mean age was 58.4 ± 11 years, male: female 18:12 and weight 79.2 ± 17 kg. Indications for deep brain stimulation were Parkinson's disease (n = 25, essential tremors (n = 2 and dystonia (n = 3. There was a very strong positive correlation between BIS and response entropy (RE (r = 0.932 and BIS and state entropy (SE (r = 0.950 and a strong negative correlation among aaMAC and BIS, RE and SE with r values of −0.686, −0.788 and −0.732, respectively. However, there was no correlation between BIS, RE, SE and haemodynamic values. Conclusion: Our study showed that BIS and entropy perform well in patients with movement disorders

  10. Effects of Phenytoin Therapy on Bispectral Index and Haemodynamic Changes Following Induction and Tracheal Intubation

    Directory of Open Access Journals (Sweden)

    Parmod P Bithal

    2009-01-01

    Full Text Available Laryngoscopy and tracheal intubation (LTI increase blood pressure and heart rate (HR. Intensity of these changes is influenced by the anaesthetic depth assessed by the bispectral index (BIS. We determined the effect of phenytoin on anaesthetic depth and its influence on haemodynamics following LTI. Fifty patients of ASA grades I and II on oral phenytoin 200 to 300mg per day for more than one week were compared with 48 control patients. Standard anaesthesia technique was followed. BIS, non invasive mean blood pressure (MBP and HR were recorded 30, 60, 90 and 120 sec after LTI. Phenytoin group needed lesser thiopentone for induction, 5 mg (1.1 vs. 4.3 mg (0.7 [p=0.036]. BIS was significantly lower in the phenytoin group vs. the control 30, 60, 90 and 120 sec after LTI [43.1 (16.0 vs. 48.9 (14.9, p=0.068, 56.3 (16.7 vs. 64.3 (14.4, p=0.013, 59.8 (15.8 vs. 67.5 (12.1, p=0.008, 62.6 (14 vs. 68.9 (11.2, p=0.017, and 64.2 (11.3 vs. 69 (11.7, p=0.033], respectively. MBP was also lower in the phenytoin group 30, 60, 90 and 120 sec after LTI [112.8 mmHg (13.8, vs. 117.9 mmHg (18 p=0.013, 108.6 (12.8 vs. 117.5 (16 p=0.003, 106.1 mmHg (14.1 vs. 113.2 mmHg (14.9, p=0.017, 101.8 mmHg (13.8 vs. 109.5 mmHg (14.1, p=0.007], respectively. HR was lower in phenytoin group at 30 sec. (p=0.027, 60 sec (p=0.219, and again at 120 sec (p=0.022. Oral phenytoin therapy for over a week results in greater anaesthetic depth as observed using BIS, which also attenuated haemodynamic response of LTI.

  11. Monitoring sleep depth: analysis of bispectral index (BIS) based on polysomnographic recordings and sleep deprivation.

    Science.gov (United States)

    Giménez, Sandra; Romero, Sergio; Alonso, Joan Francesc; Mañanas, Miguel Ángel; Pujol, Anna; Baxarias, Pilar; Antonijoan, Rosa Maria

    2017-02-01

    The assessment and management of sleep are increasingly recommended in the clinical practice. Polysomnography (PSG) is considered the gold standard test to monitor sleep objectively, but some practical and technical constraints exist due to environmental and patient considerations. Bispectral index (BIS) monitoring is commonly used in clinical practice for guiding anesthetic administration and provides an index based on relationships between EEG components. Due to similarities in EEG synchronization between anesthesia and sleep, several studies have assessed BIS as a sleep monitor with contradictory results. The aim of this study was to evaluate objectively both the feasibility and reliability of BIS for sleep monitoring through a robust methodology, which included full PSG recordings at a baseline situation and after 40 h of sleep deprivation. Results confirmed that the BIS index was highly correlated with the hypnogram (0.89 ± 0.02), showing a progressive decrease as sleep deepened, and an increase during REM sleep (awake: 91.77 ± 8.42; stage N1: 83.95 ± 11.05; stage N2: 71.71 ± 11.99; stage N3: 42.41 ± 9.14; REM: 80.11 ± 8.73). Mean and median BIS values were lower in the post-deprivation night than in the baseline night, showing statistical differences for the slow wave sleep (baseline: 42.41 ± 9.14 vs. post-deprivation: 39.49 ± 10.27; p = 0.02). BIS scores were able to discriminate properly between deep (N3) and light (N1, N2) sleep. BIS values during REM overlapped those of other sleep stages, although EMG activity provided by the BIS monitor could help to identify REM sleep if needed. In conclusion, BIS monitors could provide a useful measure of sleep depth in especially particular situations such as intensive care units, and they could be used as an alternative for sleep monitoring in order to reduce PSG-derived costs and to increase capacity in ambulatory care.

  12. Should we monitor with bispectral index in all patients at high risk for seizures in the operating room?

    Science.gov (United States)

    Elgueta, M F; Vega, P; Lema, G; Clede, L

    2013-10-01

    We report the case of a patient with a cerebral aneurysm, located in the left middle cerebral artery. During the clipping of this aneurysm, the bispectral index (BIS) increased for no apparent reason. This was then interpreted as intraoperative non-convulsive status epilepticus. This clinical condition may have negative impact in the prognosis of the patient, so it is very important to be able to detect this conditions as early as possible. Measuring the BIS while the patient is anaesthetised could be useful in this situation, considering that an increase in values greater than 60, associated with acidosis and without any other peri-anaesthetic explanation, may provide evidence of a convulsive equivalent state, allowing appropriate action to be taken. Copyright © 2012 Sociedad Española de Anestesiología, Reanimación y Terapéutica del Dolor. Published by Elsevier España. All rights reserved.

  13. Bispectral analysis applied to coherent floating potential fluctuations obtained in the edge plasmas on JFT-2M

    International Nuclear Information System (INIS)

    Nagashima, Y; Itoh, K; Itoh, S-I; Fujisawa, A; Hoshino, K; Takase, Y; Yagi, M; Ejiri, A; Ida, K; Shinohara, K; Uehara, K; Kusama, Y

    2006-01-01

    This paper presents results of bispectral analysis applied to floating potential fluctuations in the edge region of ohmically heated plasmas in the JAERI Fusion Torus-2 Modified (JFT-2M) tokamak. Inside the outermost surface of plasmas, coherent mode fluctuations (CMs) in floating potential were observed around the frequency of the geodesic acoustic mode. The squared bicoherence shows significant nonlinear couplings between the CMs and background fluctuations. The biphase at the frequency of the CMs is localized around π, while that at frequencies of background fluctuations distributes in a wide range. The total bicoherence at the frequency of the CMs is proportional to the squared amplitude of the CMs. These observations are consistent with the theoretical prediction on the drift wave-zonal flow systems. Interpretation of the absolute value of the total bicoherence is also discussed

  14. [Detection of quadratic phase coupling between EEG signal components by nonparamatric and parametric methods of bispectral analysis].

    Science.gov (United States)

    Schmidt, K; Witte, H

    1999-11-01

    Recently the assumption of the independence of individual frequency components in a signal has been rejected, for example, for the EEG during defined physiological states such as sleep or sedation [9, 10]. Thus, the use of higher-order spectral analysis capable of detecting interrelations between individual signal components has proved useful. The aim of the present study was to investigate the quality of various non-parametric and parametric estimation algorithms using simulated as well as true physiological data. We employed standard algorithms available for the MATLAB. The results clearly show that parametric bispectral estimation is superior to non-parametric estimation in terms of the quality of peak localisation and the discrimination from other peaks.

  15. Validation of the bispectral index as an indicator of anesthetic depth in Thoroughbred horses anesthetized with sevoflurane.

    Science.gov (United States)

    Tokushige, Hirotaka; Kakizaki, Masashi; Ode, Hirotaka; Okano, Atsushi; Okada, Jun; Kuroda, Taisuke; Wakuno, Ai; Ohta, Minoru

    2016-01-01

    To evaluate the bispectral index (BIS) as an indicator of anesthetic depth in Thoroughbred horses, BIS values were measured at multiple stages of sevoflurane anesthesia in five horses anesthetized with guaifenesin and thiopental following premedication with xylazine. There was no significant difference between the BIS values recorded at end-tidal sevoflurane concentrations of 2.8% (median 60 ranging from 47 to 68) and 3.5% (median 71 ranging from 49 to 82) in anesthetized horses. These BIS values during anesthesia were significantly lower (Phorses (median 98 ranging from 98 to 98) or sedated horses (median 92 ranging from 80 to 93). During the recovery phase, the BIS values gradually increased over time but did not significantly increase until the horses showed movement. In conclusion, the BIS value could be useful as an indicator of awakening during the recovery period in horses, as previous reported.

  16. Growth of strained InGaAs/GaAs quantum wells and index guided injection lasers over nonplanar substrates by molecular beam epitaxy

    International Nuclear Information System (INIS)

    Arent, D.J.; Galeuchet, Y.D.; Nilsson, S.; Meier, H.P.

    1990-01-01

    Strained InGaAs/GaAs quantum wells were grown on nonplanar substrates by molecular beam epitaxy and studied by scanning electron microscopy and low temperature spatially and spectrally resolved cathodoluminescence spectroscopy. For (100) ridges and grooves formed with (311)A sidewalls, almost complete removal of In from the strained quantum wells on the (311)A facet is observed. Corresponding increases of In content in the quantum wells grown on the (100) facets indicate that most if not all of the In is displaced from the (311)A facet via interplanar adatom migration. Ga adatom migration is also observed under our growth conditions such that quantum wells grown nominally near the critical layer thickness on structures less than ≅2.5 μm wide are no longer pseudomorphically strained, as detected by luminescence linewidth analysis. We present the first results of strained InGaAs/GaAs index guided injection lasers grown by single-step molecular beam epitaxy over nonplanar substrates and show that differences greater than 50 meV in the effective band gap of a 70 A quantum well can be achieved between the gain region and the nonabsorbing waveguide without relaxing the strain. Room temperature threshold currents as low as 6 mA for 4 μmx750 μm uncoated devices lasing continuously at a wavelength of 1.01 μm have been achieved

  17. Numerical Analysis of Index-Guiding Photonic Crystal Fibers with Low Confinement Loss and Ultra-Flattened Dispersion by FDFD Method

    Directory of Open Access Journals (Sweden)

    M. Pourmahyabadi

    2009-09-01

    Full Text Available In this article, perfectly matched layer (PML for the boundary treatment and an efficient compact two dimensional finite-difference frequency-domain (2-D FDFD method were combined to model photonic crystal fibers (PCF. For photonic crystal fibers, if we assume that the propagation constant along the propagation direction is fixed, three-dimensional hybrid guided modes can be calculated by using only a two-dimensional mesh. An index-guiding PCF with an array of air-holes surrounding the silica core region has special characteristics compared with conventional single-mode fibers (SMFs. Using this model, the fundamental characteristics of single mode photonic crystal fibers (SMPCFs such as confinement loss, bending loss, effective mode area and chromatic dispersion are numerically investigated. The results revealed that low confinement loss and zero-flattened chromatic dispersion can be obtained by varying the air-holes diameter of each ring along the PCF radius. In this work, an especial PCF with nearly zero-flattened dispersion (1.3 ps/nm/km over a wide wavelength range which covers O, E, S, C, L and U telecommunication wavelength bands and low confinement loss (0.06 dB/km at 1.55μm is designed. Macro-bending loss performance of the designed PCF is also studied and it is found that the fiber shows low bending losses for the smallest feasible bending radius of 5 mm. Also, it is revealed that the temperature sensitivity of PCFs is very low in compared with the conventional fibers.

  18. Awareness of bispectral index monitoring system among the critical care nursing personnel in a tertiary care hospital of India

    Directory of Open Access Journals (Sweden)

    Shikha Thakur

    2011-01-01

    Full Text Available Background: Bispectral index monitoring system (BIS is one of the several systems used to measure the effects of anaesthetic and sedative drugs on the brain and to track changes in the patient′s level of sedation and hypnosis. BIS monitoring provides information clinically relevant to the adjustment of dosages of sedating medication. It can help the nursing personnel in preventing under- and over sedation among intensive care unit (ICU patients. Objective: The present study was conducted to assess the knowledge of nursing personnel working in the ICU regarding BIS. Methods: Fifty-four subjects participated in the study. A structured questionnaire was developed to assess the knowledge of the nursing personnel regarding BIS. Focus group discussions were held among the nursing personnel to know their views regarding BIS. Results: Mean age (years of the subjects was 30.7΁7.19 (21-47 years, with a female preponderance. Although the use of BIS in ICU is not common, majority (94.44% were aware of BIS and its purpose. 79.62% of the subjects knew about its implication in patient care. The mean knowledge score of the subjects was 11.87΁2.43 (maximum score being 15. Conclusion: There exists an awareness among the critical care nursing staff in our institution regarding BIS and its clinical implications. Its use in the critical care setting may benefit the patients in terms of providing optimal sedation.

  19. The impact of age on bispectral index values and EEG bispectrum during anaesthesia with desflurane and halothane in children.

    Science.gov (United States)

    Tirel, O; Wodey, E; Harris, R; Bansard, J Y; Ecoffey, C; Senhadji, L

    2006-04-01

    The relationship between end-tidal sevoflurane concentration, bispectral index (BIS) and the EEG bispectrum in children appears to be age dependent. The aim of this study was to quantify the BIS values at 1 MAC (minimum alveolar concentration) for desflurane and halothane, and explore the relationship with age for these anaesthetic agents in children. ECG, EEG and BIS were recorded continuously in 90 children aged 6-170 months requiring anaesthesia for elective surgery. Fifty children were anaesthetized with desflurane, and 40 children with halothane. Recordings were performed through to a steady state of 2 MAC, and thereafter at 1 and 0.5 MAC, respectively. The bispectrum of the EEG was estimated using MATLAB(c) software. A multiple correspondence analysis (MCA) was used. At a steady state of 1 MAC, BIS values were significantly higher with halothane 62 (43-80) than desflurane 34 (18-64). BIS values were significantly correlated with age in both groups: DES (r(2)=0.57; PEEG bispectrum) were different for the two volatile anaesthetic agents. In children, BIS values are linked to age irrespective of the volatile anaesthetic agent used. The difference in BIS values for different agents at the same MAC can be explained by the specific effect on the EEG bispectrum induced by each anaesthetic agent, bringing into question the ability of the EEG bispectrum to accurately determine the depth of anaesthesia.

  20. Comparison of Bispectral Index™ values during the flotation restricted environmental stimulation technique and results for stage I sleep: a prospective pilot investigation.

    Science.gov (United States)

    Dunham, C Michael; McClain, Jesse V; Burger, Amanda

    2017-11-29

    To determine whether Bispectral Index™ values obtained during flotation-restricted environment stimulation technique have a similar profile in a single observation compared to literature-derived results found during sleep and other relaxation-induction interventions. Bispectral Index™ values were as follows: awake-state, 96.6; float session-1, 84.3; float session-2, 82.3; relaxation-induction, 82.8; stage I sleep, 86.0; stage II sleep, 66.2; and stages III-IV sleep, 45.1. Awake-state values differed from float session-1 (%difference 12.7%; Cohen's d = 3.6) and float session-2 (%difference 14.8%; Cohen's d = 4.6). Relaxation-induction values were similar to float session-1 (%difference 1.8%; Cohen's d = 0.3) and float session-2 (%difference 0.5%; Cohen's d = 0.1). Stage I sleep values were similar to float session-1 (%difference 1.9%; Cohen's d = 0.4) and float session-2 (%difference 4.3%; Cohen's d = 1.0). Stage II sleep values differed from float session-1 (%difference 21.5%; Cohen's d = 4.3) and float session-2 (%difference 19.6%; Cohen's d = 4.0). Stages III-IV sleep values differed from float session-1 (%difference 46.5%; Cohen's d = 5.6) and float session-2 (%difference 45.2%; Cohen's d = 5.4). Bispectral Index™ values during flotation were comparable to those found in stage I sleep and nadir values described with other relaxation-induction techniques.

  1. Bispectral pairwise interacting source analysis for identifying systems of cross-frequency interacting brain sources from electroencephalographic or magnetoencephalographic signals

    Science.gov (United States)

    Chella, Federico; Pizzella, Vittorio; Zappasodi, Filippo; Nolte, Guido; Marzetti, Laura

    2016-05-01

    Brain cognitive functions arise through the coordinated activity of several brain regions, which actually form complex dynamical systems operating at multiple frequencies. These systems often consist of interacting subsystems, whose characterization is of importance for a complete understanding of the brain interaction processes. To address this issue, we present a technique, namely the bispectral pairwise interacting source analysis (biPISA), for analyzing systems of cross-frequency interacting brain sources when multichannel electroencephalographic (EEG) or magnetoencephalographic (MEG) data are available. Specifically, the biPISA makes it possible to identify one or many subsystems of cross-frequency interacting sources by decomposing the antisymmetric components of the cross-bispectra between EEG or MEG signals, based on the assumption that interactions are pairwise. Thanks to the properties of the antisymmetric components of the cross-bispectra, biPISA is also robust to spurious interactions arising from mixing artifacts, i.e., volume conduction or field spread, which always affect EEG or MEG functional connectivity estimates. This method is an extension of the pairwise interacting source analysis (PISA), which was originally introduced for investigating interactions at the same frequency, to the study of cross-frequency interactions. The effectiveness of this approach is demonstrated in simulations for up to three interacting source pairs and for real MEG recordings of spontaneous brain activity. Simulations show that the performances of biPISA in estimating the phase difference between the interacting sources are affected by the increasing level of noise rather than by the number of the interacting subsystems. The analysis of real MEG data reveals an interaction between two pairs of sources of central mu and beta rhythms, localizing in the proximity of the left and right central sulci.

  2. An Adaptive Monitoring Scheme for Automatic Control of Anaesthesia in dynamic surgical environments based on Bispectral Index and Blood Pressure.

    Science.gov (United States)

    Yu, Yu-Ning; Doctor, Faiyaz; Fan, Shou-Zen; Shieh, Jiann-Shing

    2018-04-13

    During surgical procedures, bispectral index (BIS) is a well-known measure used to determine the patient's depth of anesthesia (DOA). However, BIS readings can be subject to interference from many factors during surgery, and other parameters such as blood pressure (BP) and heart rate (HR) can provide more stable indicators. However, anesthesiologist still consider BIS as a primary measure to determine if the patient is correctly anaesthetized while relaying on the other physiological parameters to monitor and ensure the patient's status is maintained. The automatic control of administering anesthesia using intelligent control systems has been the subject of recent research in order to alleviate the burden on the anesthetist to manually adjust drug dosage in response physiological changes for sustaining DOA. A system proposed for the automatic control of anesthesia based on type-2 Self Organizing Fuzzy Logic Controllers (T2-SOFLCs) has been shown to be effective in the control of DOA under simulated scenarios while contending with uncertainties due to signal noise and dynamic changes in pharmacodynamics (PD) and pharmacokinetic (PK) effects of the drug on the body. This study considers both BIS and BP as part of an adaptive automatic control scheme, which can adjust to the monitoring of either parameter in response to changes in the availability and reliability of BIS signals during surgery. The simulation of different control schemes using BIS data obtained during real surgical procedures to emulate noise and interference factors have been conducted. The use of either or both combined parameters for controlling the delivery Propofol to maintain safe target set points for DOA are evaluated. The results show that combing BIS and BP based on the proposed adaptive control scheme can ensure the target set points and the correct amount of drug in the body is maintained even with the intermittent loss of BIS signal that could otherwise disrupt an automated control system.

  3. Utilizing bi-spectral index (BIS) for the monitoring of sedated adult ICU patients: a systematic review.

    Science.gov (United States)

    Bilgili, Beliz; Montoya, Juan C; Layon, A J; Berger, Andrea L; Kirchner, H L; Gupta, Leena K; Gloss, David S

    2017-03-01

    The ideal level of sedation in the ICU is an ongoing source of scrutiny. At higher levels of sedation, the current scoring systems are not ideal. BIS may be able to improve both. We evaluated literature on effectiveness of BIS monitoring in sedated mechanically ventilated (MV) ICU patients compared to clinical sedation scores (CSS). For this systematic review, full text articles were searched in OVID, MEDLINE, EMBASE, and Cochrane databases from 1986 - 2014. Additional studies were identified searching bibliographies/abstracts from national/international Critical Care Medicine conferences and references from searched articles retrieved. Search terms were: 'Clinical sedation scale, Bi-spectral Index, Mechanical ventilation, Intensive care Unit'. Included were prospective, randomized and non-randomized studies comparing BIS monitoring with any CSS in MV adult (>18 yr old) ICU patients. Studies were graded for quality of evidence based on bias as established by the GRADE guidelines. Additional sources of bias were examined. There were five studies which met inclusion criteria. All five studies were either unclear or high risk for blinding of participants and blinding of outcome assessment. All papers had at least one source of additional high risk, or unclear/unstated. BIS monitoring in the mechanically ventilated ICU patient may decrease sedative drug dose, recall, and time to wake-up. The studies suggesting this are severely limited methodologically. BIS, when compared to subjective CSSs, is not, at this time, clearly indicated. An appropriately powered randomized, controlled study is needed to determine if this monitoring modality is of use on the ICU.

  4. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  5. Differences between state entropy and bispectral index during analysis of identical electroencephalogram signals: a comparison with two randomised anaesthetic techniques.

    Science.gov (United States)

    Pilge, Stefanie; Kreuzer, Matthias; Karatchiviev, Veliko; Kochs, Eberhard F; Malcharek, Michael; Schneider, Gerhard

    2015-05-01

    It is claimed that bispectral index (BIS) and state entropy reflect an identical clinical spectrum, the hypnotic component of anaesthesia. So far, it is not known to what extent different devices display similar index values while processing identical electroencephalogram (EEG) signals. To compare BIS and state entropy during analysis of identical EEG data. Inspection of raw EEG input to detect potential causes of erroneous index calculation. Offline re-analysis of EEG data from a randomised, single-centre controlled trial using the Entropy Module and an Aspect A-2000 monitor. Klinikum rechts der Isar, Technische Universität München, Munich. Forty adult patients undergoing elective surgery under general anaesthesia. Blocked randomisation of 20 patients per anaesthetic group (sevoflurane/remifentanil or propofol/remifentanil). Isolated forearm technique for differentiation between consciousness and unconsciousness. Prediction probability (PK) of state entropy to discriminate consciousness from unconsciousness. Correlation and agreement between state entropy and BIS from deep to light hypnosis. Analysis of raw EEG compared with index values that are in conflict with clinical examination, with frequency measures (frequency bands/Spectral Edge Frequency 95) and visual inspection for physiological EEG patterns (e.g. beta or delta arousal), pathophysiological features such as high-frequency signals (electromyogram/high-frequency EEG or eye fluttering/saccades), different types of electro-oculogram or epileptiform EEG and technical artefacts. PK of state entropy was 0.80 and of BIS 0.84; correlation coefficient of state entropy with BIS 0.78. Nine percent BIS and 14% state entropy values disagreed with clinical examination. Highest incidence of disagreement occurred after state transitions, in particular for state entropy after loss of consciousness during sevoflurane anaesthesia. EEG sequences which led to false 'conscious' index values often showed high

  6. Changes to the bispectral index and regional cerebral blood flow in a sedative state, caused by midazolam administration

    International Nuclear Information System (INIS)

    Ikeda, Junko

    2006-01-01

    Psychosedation, as used in the field of dentistry, is intended to provide trouble-free dental care while maintaining a proper level of sedation. One drug used in psychosedation is midazolam, which is known to have a strong amnestic effect. In the current research, I sought to clarify whether the bispectral index (BIS) using electroencephalogram (EEG) analysis can be used for assessment of optimal sedation in psychosedation, and what effects midazolam has on the cerebrum's mechanism of memory. The subjects were 17 healthy adult volunteers. Intravenous sedation involved a single administration of 0.06 mg/kg midazolam, or 6 mg/kg/h propofol, administered for 5 minutes and then continuously administered for 25 minutes at 3 mg/kg/h. For nitrous oxide inhalation sedation, 10-30% nitrous oxide was used. Clinical sedation and the BIS were measured in a variety of circumstances. To examine the effects of midazolam on the central nervous system, changes in brain oxygen consumption in visual memory tasks were assessed through observing changes in areas of brain activation using 3T fMRI. With intravenous sedation using midazolam or propofol, the BIS decreased immediately after drug administration, and the BIS at which optimal sedation was clinically determined was about 65. In contrast, no decrease in the BIS was noted with nitrous oxide inhalation sedation. In observing areas of brain activation by fMRI, the oxygen consumption mainly of visual cortices in the occipital lobe increased as a result of stimulation by visual memory tasks. Regardless of the amnestic effect midazolam produced in subjects, it did not suppress activation of the visual cortices in the occipital lobe. In intravenous sedation using midazolam or propofol, the BIS is effective in determining optimal sedation, and appropriate perioperative management can be performed using the BIS. However, in nitrous oxide inhalation sedation it appears that the BIS cannot be used to monitor levels of sedation. Amnestic

  7. The utility of bispectral index monitoring for prevention of rocuronium-induced withdrawal movement in children: A randomized controlled trial.

    Science.gov (United States)

    Lim, Byung Gun; Lee, Il Ok; Kim, Young Sung; Won, Young Ju; Kim, Heezoo; Kong, Myoung Hoon

    2017-01-01

    This study was designed to determine whether a deep hypnotic state with a bispectral index (BIS) value less than 40 could alleviate withdrawal movement (WM) upon rocuronium injection during anesthesia induction in children. Finally, 135 healthy children (3-12 years) scheduled for minor elective surgery were studied. Without premedication, anesthesia was induced with thiopental sodium 5 mg/kg. Patients were randomized into 2 groups (control vs experimental) and then by virtue of rocuronium injection time, patients in the experimental group were allocated into 2 groups, as follows: in the control group (group C; n = 45), rocuronium 0.6 mg/kg was administered at the loss of eyelash reflex; in the 1st experimental group, rocuronium 0.6 mg/kg was administered when BIS fell to less than 40 (group T; n = 45); however, if BIS did not fall below 40 after thiopental sodium administration, manual ventilation was provided with oxygen 6 L/minute using sevoflurane 8% and then rocuronium was administered when BIS fell below 40 (the 2nd experimental group, group S; n = 45). Rocuronium-induced WM was evaluated using a 4-point scale (no movement; movement/withdrawal involving the arm only; generalized response, with movement/withdrawal of more than 1 extremity, but no requirement for restraint of the body; and generalized response which required restraint of the body and caused coughing or breath-holding). No significant differences were found among the groups for patient characteristics including age, sex, height, and location of venous cannula. However, body weight, height, and body mass index in group S were all smaller than those in group T. The incidence of WM caused by rocuronium was 100% in group C, 95.6% in group T, and 80% in group S, and was significantly lower in group S than in group C. The grade of WM was 3.7 ± 0.6 in group C, 3.2 ± 0.9 in group T, and 2.6 ± 1.0 in group S. It was significantly lower in group T than in group C and

  8. Anesthesia recovery comparison between remifentanil-propofol and remifentanil-desflurane guided by Bispectral Index® monitoring

    Directory of Open Access Journals (Sweden)

    Raphael Grossi Rocha

    2017-09-01

    Full Text Available Background and objectives: There is a strong demand for fast and predictable anesthesia recovery with few side effects. Choice of the hypnotic agent could impact on that. This study investigated the differences between recoveries after remifentanil-propofol and remifentanil-desflurane anesthesias guided by bispectral index (BIS®. Methods: Forty patients were randomly assigned into 2 groups according to the anesthesia technique applied: remifentanil-propofol (REM-PRO and remifentanil-desflurane (REM-DES. After the discontinuation of the anesthetics, the times to extubation, to obey commands and to recover the airway protection reflex were recorted. In the post-anesthetic recovery room (PACU it was recorded the occurrence of nausea and vomiting (PONV, scores of Ramsay sedation scale and of numeric pain scale (NPS, morphine dose and length of stay in the unit. Results: Data from 38 patients were analyzed: 18 from REM-PRO and 20 from REM-DES group. Anesthesia times were similar (REM-PRO = 193 min, SD 79.9 vs. 175.7 min, SD 87.9 REM-DES; p = 0.5. REM-DES had shorter times than REM-PRO group: time to follow command (8.5 min; SD 3.0 vs. 5.6 min; SD 2.5; p = 0.0 and extubation time (6.2 min; 3.1–8.5 vs. 9.5 min; 4.9–14.4; p = 0.0. Times to recover airway protective reflex were similar: 16 patients from REM-PRO (88.9% restored the airway protective reflex 2 min after extubation vs. 17 from REM-DES (89.5%; and 2 patients from REM-PRO (11.1% vs. 2 from REM-DES (10.5% 6 min after extubation, p = 1. Ramsay sedation score, NPS, PONV incidents, morphine dose and PACU stay of length PACU were also similar. Conclusion: Remifentanil-desflurane-based anesthesia has a faster extubation time and to follow command than remifentanil-propofol-based anesthesia when both guided by BIS®. Resumo: Justificativa e objetivos: Há uma forte demanda por recuperação pós-anestésica rápida e previsível com poucos efeitos adversos. A escolha do agente

  9. Comparative study of Poincaré plot analysis using short electroencephalogram signals during anaesthesia with spectral edge frequency 95 and bispectral index.

    Science.gov (United States)

    Hayashi, K; Yamada, T; Sawa, T

    2015-03-01

    The return or Poincaré plot is a non-linear analytical approach in a two-dimensional plane, where a timed signal is plotted against itself after a time delay. Its scatter pattern reflects the randomness and variability in the signals. Quantification of a Poincaré plot of the electroencephalogram has potential to determine anaesthesia depth. We quantified the degree of dispersion (i.e. standard deviation, SD) along the diagonal line of the electroencephalogram-Poincaré plot (named as SD1/SD2), and compared SD1/SD2 values with spectral edge frequency 95 (SEF95) and bispectral index values. The regression analysis showed a tight linear regression equation with a coefficient of determination (R(2) ) value of 0.904 (p plot tightly correlates with SEF95, reflecting anaesthesia-dependent changes in electroencephalogram oscillation. © 2014 The Association of Anaesthetists of Great Britain and Ireland.

  10. Cloud cover over the equatorial eastern Pacific derived from July 1983 International Satellite Cloud Climatology Project data using a hybrid bispectral threshold method

    Science.gov (United States)

    Minnis, Patrick; Harrison, Edwin F.; Gibson, Gary G.

    1987-01-01

    A set of visible and IR data obtained with GOES from July 17-31, 1983 is analyzed using a modified version of the hybrid bispectral threshold method developed by Minnis and Harrison (1984). This methodology can be divided into a set of procedures or optional techniques to determine the proper contaminate clear-sky temperature or IR threshold. The various optional techniques are described; the options are: standard, low-temperature limit, high-reflectance limit, low-reflectance limit, coldest pixel and thermal adjustment limit, IR-only low-cloud temperature limit, IR clear-sky limit, and IR overcast limit. Variations in the cloud parameters and the characteristics and diurnal cycles of trade cumulus and stratocumulus clouds over the eastern equatorial Pacific are examined. It is noted that the new method produces substantial changes in about one third of the cloud amount retrieval; and low cloud retrievals are affected most by the new constraints.

  11. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  12. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  13. Obesity does not influence the onset and offset of sevoflurane effect as measured by the hysteresis between sevoflurane concentration and bispectral index.

    Science.gov (United States)

    Cortínez, Luis I; Gambús, Pedro; Trocóniz, Iñaki F; Echevarría, Ghislaine; Muñoz, Hernán R

    2011-07-01

    The onset and offset of action of anesthetic gases might be delayed by respiratory changes and gas exchange alterations present in obese patients. In this study, we assessed the influence of obesity on the hysteresis between sevoflurane and its effect as measured by the bispectral index (BIS). Because the use of positive end-expiratory pressure (PEEP) in obese patients has improved gas exchange, we also assessed the influence of PEEP on hysteresis. Fifteen obese and 15 normal-weight patients, ASA physical status I and II, 20 to 50 years old, scheduled to undergo general anesthesia for elective laparoscopic surgery, were prospectively studied. Anesthesia was induced with propofol and maintained with sevoflurane and fentanyl. At the end of surgery and after stable BIS values of 60 to 65, the inspired concentration of sevoflurane was increased to 5 vol% for 5 minutes or until BIS was rate constant was not influenced by body mass index or PEEP (P > 0.05). Neither obesity nor PEEP showed any influence on the PK/PD descriptors. Our results do not support the hypothesis that obesity prolongs induction or recovery times when sevoflurane, a poorly soluble anesthetic, is used to maintain anesthesia from 90 to 120 minutes.

  14. Comparative evaluation of the cerebral state index/sup TM/ and bispectral index/sup TM/ monitoring during propofol-remifentanil anesthesia for open heart surgery

    International Nuclear Information System (INIS)

    Shahbazi, S.; Saem, J.

    2007-01-01

    The Cerebral State index (CSI) is a new index based on electroencephalogram to monitor depth of anesthesia. Transferring guidelines for titration of the Bispectral index (BIS) to the CSI depends on their compatibility. We compared the relationship between BIS and CSI values during propofol-remifentanil anesthesia. Forty one adult patients about to have open heart surgeries were enrolled. The skin was prepped and electrodes of both monitors were applied according to the manufacturers recommendations. The anesthesia was induced by midazolam, propofol, remifentanil and pancuronium and maintained by propofol and remifentanil and 50% nitrous oxide in oxygen. The BIS and CSI values were recorded in 37 pre-determined milestones during the operation and the anesthetic drugs were adjusted according to clinical signs of light anesthesia regardless of the CSI or BIS values. The BIS and CSI values decreased progressively from pre induction values of 93.15 (55-100) and 88.86 (52-100) to post induction values of 38.72 (16-71) and 40.27 (5-69), respectively. These values showed good linear correlation during laryngoscopy, before and after surgical incision and during CPB; R=0.695 with determination coefficient of 0.483. We found a good correlation between BIS and CSI values. Our results might serve as a blue print for a rational translation of BIS into CSI values. (author)

  15. Anesthesia for arthroscopic shoulder surgery in the beach chair position: monitoring of cerebral oxygenation using combined bispectral index and near-infrared spectroscopy.

    Science.gov (United States)

    Kawano, Hiroaki; Matsumoto, Tomomi

    2014-10-01

    Recent research has shown that cerebrovascular complications following shoulder surgery performed in the beach chair position under general anesthesia arise secondary to cerebral ischemia. Appropriate management of cerebral oxygenation is thus one of the primary goals of anesthetic management during such procedures. The present report describes the case of a 65-year-old male patient, in which both bispectral index (BIS) and near-infrared spectroscopy (NIRS) were used to monitor cerebral oxygenation. During the positioning, we observed an increased suppression ratio (SR) while BIS and regional cerebral oxygen saturation (rSO2) were at adequate level. In view of the difference in blood pressure between the heart and the base of the brain, blood pressure was maintained to ensure adequate cerebral perfusion. Although intraoperative rSO2 was at or around the cut-off point (a 12% relative decrease from baseline), no marked decrease in BIS or further increase in the SR was observed. Monitoring of cerebral perfusion using combined BIS and NIRS optimized anesthetic management during the performance of arthroscopic shoulder surgery in the beach chair position.

  16. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  17. The effect of different doses of esmolol on hemodynamic, bispectral index and movement response during orotracheal intubation: prospective, randomized, double-blind study

    Directory of Open Access Journals (Sweden)

    Mensure Yılmaz Çakırgöz

    2014-12-01

    Full Text Available Objective: A prospective, randomized and double-blind study was planned to identify the optimum dose of esmolol infusion to suppress the increase in bispectral index values and the movement and hemodynamic responses to tracheal intubation. Materials and methods: One hundred and twenty patients were randomly allocated to one of three groups in a double-blind fashion. 2.5 mg kg-1 propofol was administered for anesthesia induction. After loss of consciousness, and before administration of 0.6 mg kg-1 rocuronium, a tourniquet was applied to one arm and inflated to 50 mm Hg greater than systolic pressure. The patients were divided into 3 groups; 1 mg kg-1 h-1 esmolol was given as the loading dose and in Group Es50 50 μg kg-1 min-1, in Group Es150 150 μg kg-1 min-1, and in Group Es250 250 μg kg-1 min-1 esmolol infusion was started. Five minutes after the esmolol has been begun, the trachea was intubated; gross movement within the first minute after orotracheal intubation was recorded. Results: Incidence of movement response and the ΔBIS max values were comparable in Group Es250 and Group Es150, but these values were significantly higher in Group Es50 than in the other two groups. In all three groups in the 1st minute after tracheal intubation heart rate and mean arterial pressure were significantly higher compared to values from before intubation (p < 0.05. In the study period there was no significant difference between the groups in terms of heart rate and mean arterial pressure. Conclusion: In clinical practise we believe that after 1 mg kg-1 loading dose, 150 μg kg-1 min-1 iv esmolol dose is sufficient to suppress responses to tracheal intubation without increasing side effects.

  18. Hemodynamics and bispectral index (BIS of dogs anesthetized with midazolam and ketamine associated with medetomidine or dexmedetomidine and submitted to ovariohysterectomy Avaliação hemodinâmica e do índice bispectral (BIS de cadelas anestesiadas com midazolam e cetamina associados à medetomidina ou dexmedetomidina e submetidas a ovário-salpingo-histerectomia

    Directory of Open Access Journals (Sweden)

    Fernando do Carmo Silva

    2010-04-01

    Full Text Available PURPOSE: To evaluate hemodynamics and bispectral index (BIS in bitches anesthetized with ketamine and midazolam in combination with dexmedetomidine or medetomidine and submitted to ovariohysterectomy. METHODS: Twenty bitches pretreated with levomedetomidine and buprenorphine were anesthetized with 5 mg.kg-1 ketamine and 0.2 mg.kg-1 midazolam i.v. Continuous infusion of 0.4 mg.kg-1.h-1 midazolam and 20 mg.kg-1.h-1 ketamine was initiated in combination with DEX (n=10: 20 µg.kg-1.h-1 dexmedetomidine or MED (n=10: 30 µg.kg-1.h-1 medetomidine over 30 minutes. A pharmacokinetic study provided dexmedetomidine plasma concentration, set to be 3.0 ng.mL-1. RESULTS: BIS decreased in both groups (P0.05, but heart rate decreased in both groups, as compared to control values (POBJETIVO: Verificar o comportamento hemodinâmico e o índice bispectral de cadelas anestesiadas com cetamina e midazolam associados à dexmedetomidina ou medetomidina. MÉTODOS: Vinte cadelas receberam pré-tratamento com levomepromazina e buprenorfina e foram anestesiadas com cetamina, 5 mg.kg-1 i.v., e midazolam, 0,2 mg.kg-1 i.v., seguidos da administração contínua de midazolam, 0,4 mg.kg-1.h-1, e cetamina, 20 mg.kg-1.h-1, associados, conforme o grupo, à: DEX (n=10: dexmedetomidina 20 µg.kg-1.h-1 ou MED (n=10: medetomidina 30 µg.kg-1.h-1, mantidos por 30 minutos. A dose de dexmedetomidina foi obtida por meio de estudo farmacocinético planejando-se concentração plasmática de 3,0 ng.mL-1. RESULTADOS: Os valores do BIS diminuíram em ambos os grupos (P0,05, sem a presença de efeitos adversos. CONCLUSÃO: A administração contínua de dexmedetomidina em concentração plasmática calculada de 3 ng.mL-1, em combinação com midazolam e cetamina, resulta em plano anestésico adequado para castração de cadelas, estabilidade hemodinâmica e despertar tranquilo, sem efeitos adversos.

  19. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  20. A Framework for Quantifying the Impacts of Sub-Pixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bi-Spectral Method.

    Science.gov (United States)

    Zhang, Z; Werner, F.; Cho, H. -M.; Wind, Galina; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, Kerry

    2017-01-01

    The so-called bi-spectral method retrieves cloud optical thickness (t) and cloud droplet effective radius (re) simultaneously from a pair of cloud reflectance observations, one in a visible or near infrared (VIS/NIR) band and the other in a shortwave-infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring sub-pixel variations of cloud reflectances can lead to a significant bias in the retrieved t and re. In this study, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of sub-pixel variances of VIS/NIR and SWIR cloud reflectances and their covariance on the t and re retrievals. This framework takes into account the fact that the retrievals are determined by both VIS/NIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how sub-pixel cloud reflectance variations impact the t and re retrievals based on the bi-spectral method. In particular, our framework provides a mathematical explanation of how the sub-pixel variation in VIS/NIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval.

  1. Nitrous Oxide and Nitrous Oxide-Free Low-Flow Anesthesia Using Bispectral Index Monitoring: Effects on Hemodynamics, Recovery Times, Volatile Anesthetic Consumption and Costs

    Directory of Open Access Journals (Sweden)

    Bengü Gülhan Köksal

    2010-12-01

    Full Text Available Aim: In this study, we aimed to compare the effects of desfluraneN2O and desflurane-fentanyl combinations on hemodynamics, recovery times, volatile anesthetic consumption and costs in low-flow desflurane anesthesia by bispectral index (BIS monitoring of depth of anesthesia. Methods: After approval of ethics committee and obtaining patient consents, 60 patients were divided into two equal groups randomly. Non-invasive blood pressure measurement, ECG, SpO2 and BIS were monitored. All patients received 10 L .min-1 100% oxygen with mask for 5 minute before intubation. 2 mg.kg-1 propofol, 2 μg.kg-1 fentanyl and 0.6 mg.kg-1 rocuronium bromide were administered at induction in both groups. Desfluran 6% was chosen for anesthesia maintenance. Group 1 received 50% O2-N2O mixture in 6 L.min-1 and Group 2 received 50% O2-air mixture in 6 L.min-1 as carrier gas. Low-flow anesthesia (1 L.min-1 was started after a 10-min period of initial high flow (6 L.min-1. In Group 2, infusion of fentanyl was begun in 1 μg.kg.hour-1 rate. Desflurane level was adjusted at a main BIS value of 40-60. Blood pressure, heart rate, FiO2, etO2, FiN22, EtN2O, FiCO2, EtCO2, Fidesfluran and Etdesflurane were recorded. Results: There were no significant differences between the two groups in terms of heart rate, arterial blood pressure, settings of desfluran and recovery time. BIS values (p<0.001 and anesthetic agent costs (p<0.001 were higher in Group 2. Conclusion: Using fentanyl infusion instead of nitrous oxide in low flow-anesthesia with desflurane did not alter the hemodynamic parameters. Fentanyl infusion with medical air-oxygen as carrier gas is an alternative technique, but increases BIS values and anesthetic agent costs. (The Medical Bulletin of Haseki 2010; 48: 132-8

  2. A Framework Based on 2-D Taylor Expansion for Quantifying the Impacts of Sub-Pixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bi-Spectral Method

    Science.gov (United States)

    Zhang, Z.; Werner, F.; Cho, H. -M.; Wind, G.; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, Kerry

    2016-01-01

    The bi-spectral method retrieves cloud optical thickness and cloud droplet effective radius simultaneously from a pair of cloud reflectance observations, one in a visible or near-infrared (VISNIR) band and the other in a shortwave infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring sub-pixel variations of cloud reflectances can lead to a significant bias in the retrieved and re. In the literature, the retrievals of and re are often assumed to be independent and considered separately when investigating the impact of sub-pixel cloud reflectance variations on the bi-spectral method. As a result, the impact on is contributed only by the sub-pixel variation of VISNIR band reflectance and the impact on re only by the sub-pixel variation of SWIR band reflectance. In our new framework, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of sub-pixel variances of VISNIR and SWIR cloud reflectances and their covariance on the and re retrievals. This framework takes into account the fact that the retrievals are determined by both VISNIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how sub-pixel cloud reflectance variations impact the and re retrievals based on the bi-spectral method. In particular, our framework provides a mathematical explanation of how the sub-pixel variation in VISNIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval. We test our framework using synthetic cloud fields from a large-eddy simulation and real observations from Moderate Resolution Imaging Spectroradiometer. The predicted results based on our framework agree very well with the numerical simulations. Our framework can be used

  3. A Framework Based on 2-D Taylor Expansion for Quantifying the Impacts of Subpixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bispectral Method

    Science.gov (United States)

    Zhang, Z.; Werner, F.; Cho, H.-M.; Wind, G.; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, K.

    2016-01-01

    The bispectral method retrieves cloud optical thickness (t) and cloud droplet effective radius (re) simultaneously from a pair of cloud reflectance observations, one in a visible or near-infrared (VIS/NIR) band and the other in a shortwave infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring subpixel variations of cloud reflectances can lead to a significant bias in the retrieved t and re. In the literature, the retrievals of t and re are often assumed to be independent and considered separately when investigating the impact of subpixel cloud reflectance variations on the bispectral method. As a result, the impact on t is contributed only by the subpixel variation of VIS/NIR band reflectance and the impact on re only by the subpixel variation of SWIR band reflectance. In our new framework, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of subpixel variances of VIS/NIR and SWIR cloud reflectances and their covariance on the t and re retrievals. This framework takes into account the fact that the retrievals are determined by both VIS/NIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how subpixel cloud reflectance variations impact the t and re retrievals based on the bispectral method. In particular, our framework provides a mathematical explanation of how the subpixel variation in VIS/NIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval. We test our framework using synthetic cloud fields from a large-eddy simulation and real observations from Moderate Resolution Imaging Spectroradiometer. The predicted results based on our framework agree very well with the numerical simulations. Our

  4. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  5. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  7. Cirrus Cloud Optical and Microphysical Property Retrievals from eMAS During SEAC4RS Using Bi-Spectral Reflectance Measurements Within the 1.88 micron Water Vapor Absorption Band

    Science.gov (United States)

    Meyer, K.; Platnick, S.; Arnold, G. T.; Holz, R. E.; Veglio, P.; Yorks, J.; Wang, C.

    2016-01-01

    Previous bi-spectral imager retrievals of cloud optical thickness (COT) and effective particle radius (CER) based on the Nakajima and King (1990) approach, such as those of the operational MODIS cloud optical property retrieval product (MOD06), have typically paired a non-absorbing visible or near-infrared wavelength, sensitive to COT, with an absorbing shortwave or midwave infrared wavelength sensitive to CER. However, in practice it is only necessary to select two spectral channels that exhibit a strong contrast in cloud particle absorption. Here it is shown, using eMAS observations obtained during NASAs SEAC4RS field campaign, that selecting two absorbing wavelength channels within the broader 1.88 micron water vapor absorption band, namely the 1.83 and 1.93 micron channels that have sufficient differences in ice crystal single scattering albedo, can yield COT and CER retrievals for thin to moderately thick single-layer cirrus that are reasonably consistent with other solar and IR imager-based and lidar-based retrievals. A distinct advantage of this channel selection for cirrus cloud retrievals is that the below cloud water vapor absorption minimizes the surface contribution to measured cloudy TOA reflectance, in particular compared to the solar window channels used in heritage retrievals such as MOD06. This reduces retrieval uncertainty resulting from errors in the surface reflectance assumption, as well as reduces the frequency of retrieval failures for thin cirrus clouds.

  8. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  9. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  10. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  11. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  12. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  13. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  14. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  15. Midazolam por via oral como medicação pré-anestésica em crianças e adolescentes com paralisia cerebral: estudo comparativo das variações do índice bispectral Midazolam por vía oral como medicación preanestésica en niños y adolescentes con parálisis cerebral: estudio comparativo de las variaciones del índice bispectral Oral midazolam as pre-anesthetic medication in children and teenagers with cerebral palsy: a comparative study on the variations of the bispectral index

    Directory of Open Access Journals (Sweden)

    Verônica Vieira da Costa

    2009-02-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: O midazolam é um derivado benzodiazepínico com ação hipnótica e muito utilizado como medicação pré-anestésica em anestesia pediátrica. As crianças com paralisia cerebral (PC também se beneficiam do uso do midazolam, mas seus efeitos são ainda desconhecidos sobre esse grupo de pacientes que apresentam uma série de particularidades, com alterações inclusive no local de ação do midazolam. O objetivo do estudo foi avaliar a ação do midazolam utilizado como medicação pré-anestésica sobre o índice bispectral (EEG-BIS dos pacientes com paralisia cerebral. MÉTODO: Foram avaliados dois grupos de pacientes: um com diagnóstico de PC e outro sem doença do sistema nervoso central (SNC e periférico. Foram registrados valores de EEG-BIS na enfermaria na véspera da operação e no dia da operação, 40 minutos depois da administração de 0,6 mg.kg-1 de midazolam via oral. Foram excluídos pacientes com história de reação paradoxal ao midazolam e pacientes do grupo-controle que estivessem em uso de outra medicação. RESULTADOS: Foram estudados 77 pacientes de ambos os sexos, entre 4 e 18 anos de idade. Não houve diferença entre os valores de EEG-BIS basal entre os grupos estudados. Após o uso do midazolam houve diminuição dos valores do EEG-BIS nos dois grupos estudados, com diferença estatística significativa em cada grupo. Na comparação entre grupos não houve diferença estatística. CONCLUSÕES: O midazolam administrado como medicação pré-anestésica na dose de 0,6 mg.kg-1 diminui os valores basais do EEG-BIS sem caracterizar hipnose e sem diferença estatística nos grupos estudados.JUSTIFICATIVA Y OBJETIVOS: El midazolam es un derivado benzodiazepínico con acción hipnótica y muy utilizado como medicación preanestésica en anestesia pediátrica. Los niños con parálisis cerebral (PC también se benefician del uso del midazolam, pero sus efectos todavía se desconocen sobre ese

  16. The impact of cloud vertical profile on liquid water path retrieval based on the bispectral method: A theoretical study based on large-eddy simulations of shallow marine boundary layer clouds

    Science.gov (United States)

    Miller, Daniel J.; Zhang, Zhibo; Ackerman, Andrew S.; Platnick, Steven; Baum, Bryan A.

    2018-01-01

    Passive optical retrievals of cloud liquid water path (LWP), like those implemented for Moderate Resolution Imaging Spectroradiometer (MODIS), rely on cloud vertical profile assumptions to relate optical thickness (τ) and effective radius (re) retrievals to LWP. These techniques typically assume that shallow clouds are vertically homogeneous; however, an adiabatic cloud model is plausibly more realistic for shallow marine boundary layer cloud regimes. In this study a satellite retrieval simulator is used to perform MODIS-like satellite retrievals, which in turn are compared directly to the large-eddy simulation (LES) output. This satellite simulator creates a framework for rigorous quantification of the impact that vertical profile features have on LWP retrievals, and it accomplishes this while also avoiding sources of bias present in previous observational studies. The cloud vertical profiles from the LES are often more complex than either of the two standard assumptions, and the favored assumption was found to be sensitive to cloud regime (cumuliform/stratiform). Confirming previous studies, drizzle and cloud top entrainment of dry air are identified as physical features that bias LWP retrievals away from adiabatic and toward homogeneous assumptions. The mean bias induced by drizzle-influenced profiles was shown to be on the order of 5–10 g/m2. In contrast, the influence of cloud top entrainment was found to be smaller by about a factor of 2. A theoretical framework is developed to explain variability in LWP retrievals by introducing modifications to the adiabatic re profile. In addition to analyzing bispectral retrievals, we also compare results with the vertical profile sensitivity of passive polarimetric retrieval techniques. PMID:29637042

  17. The impact of cloud vertical profile on liquid water path retrieval based on the bispectral method: A theoretical study based on large-eddy simulations of shallow marine boundary layer clouds.

    Science.gov (United States)

    Miller, Daniel J; Zhang, Zhibo; Ackerman, Andrew S; Platnick, Steven; Baum, Bryan A

    2016-04-27

    Passive optical retrievals of cloud liquid water path (LWP), like those implemented for Moderate Resolution Imaging Spectroradiometer (MODIS), rely on cloud vertical profile assumptions to relate optical thickness ( τ ) and effective radius ( r e ) retrievals to LWP. These techniques typically assume that shallow clouds are vertically homogeneous; however, an adiabatic cloud model is plausibly more realistic for shallow marine boundary layer cloud regimes. In this study a satellite retrieval simulator is used to perform MODIS-like satellite retrievals, which in turn are compared directly to the large-eddy simulation (LES) output. This satellite simulator creates a framework for rigorous quantification of the impact that vertical profile features have on LWP retrievals, and it accomplishes this while also avoiding sources of bias present in previous observational studies. The cloud vertical profiles from the LES are often more complex than either of the two standard assumptions, and the favored assumption was found to be sensitive to cloud regime (cumuliform/stratiform). Confirming previous studies, drizzle and cloud top entrainment of dry air are identified as physical features that bias LWP retrievals away from adiabatic and toward homogeneous assumptions. The mean bias induced by drizzle-influenced profiles was shown to be on the order of 5-10 g/m 2 . In contrast, the influence of cloud top entrainment was found to be smaller by about a factor of 2. A theoretical framework is developed to explain variability in LWP retrievals by introducing modifications to the adiabatic r e profile. In addition to analyzing bispectral retrievals, we also compare results with the vertical profile sensitivity of passive polarimetric retrieval techniques.

  18. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  19. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  20. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  1. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  2. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  3. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  4. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  5. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  6. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  7. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  8. An index guiding temporal planting policies for wind erosion reduction

    NARCIS (Netherlands)

    Zhao, C.X.; Zheng, D.W.; Stigter, C.J.; He, W.Q.; Tuo, D.B.; Zhao, P.

    2006-01-01

    Vegetation cover has spatial as well as temporal characteristics, but the latter are often neglected. Temporal cover characteristics were explored to recommend planting policies for returning arable land into land better protected from serious wind erosion during late autumn, winter, and

  9. Analysis of Indexed-Guided Highly Birefringent Photonic Crystal ...

    African Journals Online (AJOL)

    In this paper, a comparative study of three geometries of highly birefringent photonic crystal fibers (HB PCF) is presented. The proposed geometries are: V type PCF, Pseudo-Panda PCF and selectively liquid-filled PCF. Based on the famous Finite Difference Time Domain (FDTD) method with the perfectly matched layer ...

  10. Vertical integration of dual wavelength index guided lasers

    NARCIS (Netherlands)

    Karouta, F.; Tan, H.H.; Jagadish, C.; Roy, van B.H.

    1999-01-01

    The vertical integration of two GaAs-based lasers operating at different wavelengths has been achieved with the use of re-growth technology. A V-channel substrate inner stripe structure was used for the bottom laser and a ridge waveguide for the top laser. Both lasers shared a common electrode and

  11. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  12. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  13. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  14. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  15. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  16. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  17. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  18. Patient controlled sedation using a standard protocol for dressing changes in burns: patients' preference, procedural details and a preliminary safety evaluation.

    Science.gov (United States)

    Nilsson, Andreas; Steinvall, Ingrid; Bak, Zoltan; Sjöberg, Folke

    2008-11-01

    Patient controlled sedation (PCS) enables patients to titrate doses of drugs by themselves during different procedures involving pain or discomfort. We studied it in a prospective crossover design using a fixed protocol without lockout time to examine it as an alternative method of sedation for changing dressings in burned patients. Eleven patients with >10% total burn surface area (TBSA) had their dressings changed, starting with sedation by an anaesthetist (ACS). The second dressing change was done with PCS (propofol/alfentanil) and the third time the patients had to choose ACS or PCS. During the procedures, data on cardiopulmonary variables, sedation (bispectral index), pain intensity (VAS), procedural details, doses of drugs, and patients' preferences were collected to compare the two sedation techniques. The study data indicated that wound care in burned patients is feasible with a standardized PCS protocol. The patients preferred PCS to ACS on the basis of self-control, and because they had less discomfort during the recovery period. Wound care was also considered adequate by the staff during PCS. No respiratory (respiratory rate/transcutaneous PCO(2)) or cardiovascular (heart rate/blood pressure) adverse events were recorded at any time during any of the PCS procedures. The doses of propofol and alfentanil and BIS index decrease were less during PCS than ACS. Procedural pain was higher during PCS but lower after the procedure. We suggest that PCS using a standard protocol is an interesting alternative to anaesthetist-provided sedation during dressing changes. It seems effective, saves resources, is safe, and at same time is preferred by the patients. The strength of these conclusions is, however, hampered by the small size of this investigation and therefore further studies are warranted.

  19. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  20. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  1. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  2. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  3. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  4. Relação entre a infusão contínua de dexmedetomidina e a fração expirada de sevoflurano monitorizada pelo índice bispectral

    Directory of Open Access Journals (Sweden)

    Magalhães Edno

    2004-01-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: A associação de agentes venosos à anestesia geral inalatória proporciona melhor qualidade de analgesia e hipnose. A dexmedetomidina é um agonista específico alfa2-adrenérgico com estas características e reconhecida por proporcionar estabilidade hemodinâmica. O objetivo do estudo foi avaliar o efeito da infusão contínua de dexmedetomidina na fração expirada de sevoflurano (FEsevo em anestesia geral, monitorizada pela análise bispectral do EEG (BIS. MÉTODO: Estudou-se, de modo prospectivo, 24 pacientes adultos, de ambos os sexos, estado físico ASA I e II, submetidos à cirurgias eletivas sob anestesia geral, monitorizados com ECG, PANI, SpO2, P ET CO2, FEsevo e BIS. Procedeu-se a indução venosa com alfentanil (30 µg.kg-1, tiopental (5 mg.kg-1 e vecurônio (0,1 mg.kg-1 e intubação traqueal. Iniciaram-se a administração de sevoflurano (manutenção do BIS entre 40 e 60, a ventilação controlada com volume corrente de 10 ml.kg-1 e a manutenção da P ET CO2 entre 35 e 45 mmHg. Na fase de manutenção da anestesia, após 60 minutos da indução anestésica (M60, foi iniciada a infusão contínua de dexmedetomidina em 2 fases: infusão inicial (1 µg.kg-1 em 20 minutos; e, infusão de manutenção (0,5 µg.kg-1.h-1. A concentração de sevoflurano foi ajustada para manter o valor de BIS entre 40 e 60. As variáveis de PA, FC, FEsevo, SpO2, P ET CO2 e BIS foram avaliadas nos momentos pré-indução (M-15, M15, M45, M75, M105 e M120. RESULTADOS: A associação da dexmedetomidina à anestesia geral com sevoflurano proporcionou redução significativa (p < 0,05 da FEsevo de M45 (1,604 ± 0,485 a M105 (1,073 ± 0,457 e de M45 (1,604 ± 0,485 a M120 (1,159 ± 0,475. As variáveis hemodinâmicas analisadas apresentaram diferenças estatisticamente significantes com p < 0,05, mas sem repercussões clínicas. CONCLUSÕES: A associação de dexmedetomidina em infusão contínua (0,5 µg.kg-1.h-1 à anestesia

  5. Heart Transplantation - Spectral and Bispectral Analysis

    National Research Council Canada - National Science Library

    Toledo, E

    2001-01-01

    .... 25 recordings were obtained from 13 male HT patients at time after transplant (TAT) ranging 0.5-65 months. We observed an interesting evolution with TAT in heart rate response to active standing...

  6. Bispectral analysis: comparison of two windowing functions

    Science.gov (United States)

    Silvagni, D.; Djerroud, C.; Réveillé, T.; Gravier, E.

    2018-02-01

    Amongst all the normalized forms of bispectrum, the bicoherence is shown to be a very useful diagnostic tool in experimental studies of nonlinear wave interactions in plasma, as it measures the fraction of wave power due to the quadratic wave coupling in a self-excited fluctuation spectrum [1, 2]. In order to avoid spectral leakage, the application of a windowing function is needed during the bicoherence computation. Spectral leakage from statistically dependent components are of crucial importance in the discrimination between coupled and uncoupled modes, as they will introduce in the bicoherence spectrum phase-coupled modes which in reality do not exist. Therefore, the windowing function plays a key role in the bicoherence estimation. In this paper, two windowing methods are compared: the multiplication of the initial signal by the Hanning function and the subtraction of the straight line which links the two extremities of the signal. The influence of these two windowing methods on both the power spectrum and the bicoherence spectrum is showed. Although both methods give precise results, the Hanning function appears to be the more suitable window.

  7. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  10. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  11. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  12. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  13. Haemodynamic stability during anaesthesia induction with propofol – impact of phenylephrine. A double-blind, randomised clinical trial.

    OpenAIRE

    KAMENIK, MIRT; KOS, DARJAN; MÖLLER PETRUN, Andreja; GREEN, DAVID W; ZORKO, NUŠKA; MEKIŠ, DUŠAN

    2018-01-01

    Background. We studied the efects of a parallel phenylephrine infusion during bispectral index guided anaesthesia induction with propofol on haemodynamic parameters. We hypothesised that mean arterial pressure and cardiac index would be better maintained in the group of patients receiving the phenylephrine infusion during induction. Methods. We studied ASA I-III patients scheduled for oncological abdominal surgery. Forty patients randomly received either a ...

  14. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  15. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  16. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  17. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  18. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  19. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  20. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  1. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  2. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  3. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  4. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  5. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  6. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  7. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  8. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  9. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  10. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  11. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  12. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  13. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  14. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  15. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  16. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  17. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  18. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  19. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  20. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  1. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  2. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  3. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  4. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  5. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  8. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  9. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  10. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  11. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  12. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  13. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  14. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  15. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  16. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  17. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  18. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  19. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  20. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  1. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  2. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  3. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  4. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  5. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  6. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  7. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  8. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  9. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  10. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  11. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  13. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  14. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  15. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  16. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  17. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  18. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  19. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  20. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  1. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  2. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  3. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  4. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  5. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  6. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  7. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  8. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  9. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  10. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  11. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  12. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  13. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  14. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  15. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  16. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  17. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  18. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  19. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  1. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  2. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  3. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  4. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  5. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  6. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  7. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  8. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  9. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  10. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  11. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  14. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  15. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  17. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  18. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  19. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  20. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  1. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  2. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  3. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  4. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  5. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  6. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  7. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  8. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  9. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  10. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  11. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  12. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  13. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  14. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  15. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  16. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  17. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  18. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  19. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  20. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  1. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  2. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  3. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  4. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  5. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  6. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  7. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  8. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  9. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  10. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  11. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  12. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  13. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  16. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  17. Edema index-guided disease management improves 6-month outcomes of patients with acute heart failure.

    Science.gov (United States)

    Liu, Min-Hui; Wang, Chao-Hung; Huang, Yu-Yen; Tung, Tao-Hsin; Lee, Chii-Ming; Yang, Ning-I; Wang, Jong-Shyan; Kuo, Li-Tang; Cherng, Wen-Jin

    2012-01-01

    The efficacy of heart failure (HF) management programs is compromised by the challenge of early identification of patients at imminent risk. Segmental multifrequency bioelectrical impedance analysis can generate an "edema index" (EI) as a surrogate for the body fluid status. In this study, we tested whether integration of EI-guided management improved the 6-month outcomes of HF patients under multidisciplinary care. In total, 159 patients with acute HF were randomized into control, case management (CM), and EI-guided CM (EI) groups (n = 53 in each group). In the EI group, a management algorithm was designed based on the measured EI. The analyzed endpoints included HF-related and all cause-related events during the 6-month follow-up period. In the 6 months, there were 11 (6.9%) deaths, 19 (11.9%) HF-related rehospitalizations, and 45 (28.3%) all-cause-related rehospitalizations. Compared to the control (26.4%) and CM groups (15.1%), the EI group had a lower rate of HF-related death and rehospitalization (3.8%, P = 0.004). Multivariate analysis revealed that EI-guided management was an independent predictor of a lower HF-related event rate (hazard ratio = 0.15, 95%CI = 0.03~0.66, P = 0.012). Patients with a higher pre-discharge EI were older, had lower blood albumin and hemoglobin levels, and had a higher functional class and incidences of diabetes mellitus and chronic kidney disease. An increase in the pre-discharge EI by 0.001 increased the HF-related event rate by 6% (P = 0.002). Use of EI-guided management lowered this risk (P = 0.03). In conclusion, an EI-based HF management program demonstrated an event-lowering effect superior to traditional nurse-led multidisciplinary care in 6 months after an acute HF episode.

  18. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  19. Bi-Spectral Method for Radar Target Recognition

    National Research Council Canada - National Science Library

    Yeo, Jiunn W

    2006-01-01

    .... Since World War II, the Identification of Friend or Foe (IFF) systems installed in radar systems have served as the primary cooperative target identification techniques based on the "question and answer" interrogation loop of unidentified aircraft...

  20. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  1. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  2. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  3. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  4. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  5. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  6. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  7. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  8. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  9. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  10. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  11. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  12. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  13. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  14. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  15. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  16. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  17. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  18. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  19. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  20. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  1. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  2. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  3. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  4. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  5. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  6. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  7. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  8. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  11. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  12. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  13. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  14. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  15. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  16. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  17. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  18. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  19. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  20. Semantics and logic for security protocols

    NARCIS (Netherlands)

    Jacobs, B.P.F.; Hasuo, I.

    2009-01-01

    This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of

  1. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  2. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  3. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...

  4. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  5. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  6. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  7. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  8. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  9. Current Sterilization Protocols-An Orthodontic Perspective

    Directory of Open Access Journals (Sweden)

    Abraham Vinod Korath

    2010-01-01

    Part I of this article focuses on the working principles of various methods of sterilization with an appraisalof their effects on orthodontic instruments. Additionally,contributory factors of instrument damage is enumerated to emphasis the importance of adhering to precise protocols and manufacturer recommendations as well as in alleviating some misconceptions about sterilization induced instrument damage.

  10. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  11. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  12. Performance comparison of secure comparison protocols

    NARCIS (Netherlands)

    Kerschbaum, F.; Biswas, D.; Hoogh, de S.J.A.

    2009-01-01

    Secure multiparty computation (SMC) has gained tremendous importance with the growth of the Internet and e-commerce, where mutually untrusted parties need to jointly compute a function of their private inputs. However, SMC protocols usually have very high computational complexities, rendering them

  13. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  14. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  15. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  16. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  17. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  18. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  19. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  20. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  1. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  2. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  3. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  4. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  5. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  6. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  7. Efeitos de diferentes frações inspiradas de oxigênio no índice biespectral em cães submetidos à infusão contínua de propofol Effects of several inspired oxygen fractions on the bispectral index in dogs submitted to continuous infusion of propofol

    Directory of Open Access Journals (Sweden)

    P.C.F. Lopes

    2008-04-01

    Full Text Available Avaliaram-se os efeitos do fornecimento de diferentes frações inspiradas de oxigênio (FiO2 sobre o índice biespectral (BIS em cães submetidos a infusão contínua de propofol e mantidos em ventilação espontânea. Oito cães foram submetidos a cinco anestesias, diferenciando-se uma da outra pela FiO2 fornecida. Formaram-se cinco grupos denominados G100 (FiO2 = 1; G80 (FiO2 = 0,8; G60 (FiO2 = 0,6; G40 (FiO2 = 0,4 e G20 (FiO2 = 0,21. Os animais foram induzidos à anestesia com propofol na dose necessária para intubação, e, ato contínuo, iniciaram-se a infusão do fármaco e o fornecimento de oxigênio, conforme a FiO2 determinada para cada grupo. As primeiras mensurações (M0 foram efetuadas 30 minutos após o início da infusão do anestésico e, depois, em intervalos de 15 minutos (M15, M30, M45 e M60. A pressão parcial de oxigênio no sangue arterial (PaO2 variou conforme a FiO2, ou seja, quanto maior a FiO2, maior foi a PaO2. Para a pressão parcial de dióxido de carbono no sangue arterial (PaCO2, foram registradas diferenças em M30, no qual G100 foi maior que G20. Não foram observadas diferenças significativas nas variáveis estudadas do BIS. Os intervalos de médias registrados para o BIS foram, para G100, de 68 a 62; G80, de 71 a 58; G60, de 72 a 62; G40, de 76 a 68; e G20, de 77 a 68. Conclui-se que as variáveis relacionadas ao BIS não são afetadas pelo emprego de diferentes FiO2, e sugere-se que o monitoramento pelo BIS foi capaz de detectar alterações no equilíbrio do fluxo sangüíneo cerebral, oriundas das alterações ocasionadas na dinâmica respiratória pelo emprego de diferentes frações inspiradas de oxigênio.The effects of several inspired oxygen fractions (FiO2 on the bispectral index in spontaneously breathing dogs submitted to continuous infusion of propofol were evaluated. Eight adult mongrel dogs were used. Each animal was submitted to five anesthesias. In each procedure, the patient was allowed to

  8. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  9. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  10. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  11. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  12. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  13. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  14. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  15. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  16. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  17. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  18. Kyoto protocol and Nepal's energy sector

    International Nuclear Information System (INIS)

    Pokharel, Shaligram

    2007-01-01

    Nepal has recently ratified Kyoto Protocol, which considers justifiable use of resources to limit or reduce the emission of gases that contribute to green house gas inventory in the atmosphere. Nepal's per capita green gas (GHG) emission from energy use is insignificant. However, it is important for Nepal to adopt environmentally friendly energy options based on local resources like hydropower and biomass. Nepal can benefit from the provisions of clean development mechanism (CDM) under the Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCC) or carbon funds being promoted by various organizations in order to obtain funding for new projects that reduce GHG emissions (ER). Funding can be generated through Carbon trading in international market as well. In this paper, the country's current contribution to GHG due to energy consumption is evaluated. Options for promoting more sustainable and environmentally friendly projects have also been discussed

  19. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  20. May the Kyoto protocol produce results?

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2009-01-01

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  1. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  2. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  3. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  4. Protocol for the verification of minimum criteria

    International Nuclear Information System (INIS)

    Gaggiano, M.; Spiccia, P.; Gaetano Arnetta, P.

    2014-01-01

    This Protocol has been prepared with reference to the provisions of article 8 of the Legislative Decree of May 26, 2000 No. 187. Quality controls of radiological equipment fit within the larger 'quality assurance Program' and are intended to ensure the correct operation of the same and the maintenance of that State. The pursuit of this objective guarantees that the radiological equipment subjected to those controls also meets the minimum criteria of acceptability set out in annex V of the aforementioned legislative decree establishing the conditions necessary to allow the functions to which each radiological equipment was designed, built and for which it is used. The Protocol is established for the purpose of quality control of radiological equipment of Cone Beam Computer Tomography type and reference document, in the sense that compliance with stated tolerances also ensures the subsistence minimum acceptability requirements, where applicable.

  5. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  6. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  7. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  8. Montreal Protocol Benefits simulated with CCM SOCOL

    Directory of Open Access Journals (Sweden)

    T. Egorova

    2013-04-01

    Full Text Available Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS, the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA on ozone and UV radiation, two different runs of the chemistry-climate model (CCM SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery. For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  9. 47 CFR 11.31 - EAS protocol.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS protocol. 11.31 Section 11.31... characters. FM or TV call signs must use a slash ASCII character number 47 (/) in lieu of a dash. (c) The EAS... the State EAS Mapbook. FIPS# State: AL 01 AK 02 AZ 04 AR 05 CA 06 CO 08 CT 09 DE 10 DC 11 FL 12 GA 13...

  10. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  11. D-RATS 2011: RAFT Protocol Overview

    Science.gov (United States)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  12. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  13. Modeling and Verification of the Bitcoin Protocol

    OpenAIRE

    Chaudhary, Kaylash; Fehnker, Ansgar; van de Pol, Jaco; Stoelinga, Marielle

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would...

  14. Witnet: A Decentralized Oracle Network Protocol

    OpenAIRE

    de Pedro, Adán Sánchez; Levi, Daniele; Cuende, Luis Iván

    2017-01-01

    Witnet is a decentralized oracle network (DON) that connects smart contracts to the outer world. Generally speaking, it allows any piece of software to retrieve the contents published at any web address at a certain point in time, with complete and verifiable proof of its integrity and without blindly trusting any third party. Witnet runs on a blockchain with a native protocol token (called Wit), which miners-called witnesses-earn by retrieving, attesting and delivering web contents for clien...

  15. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  16. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  17. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  18. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  19. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  20. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  1. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  2. On consensus through communication without a commonly known protocol

    OpenAIRE

    Tsakas Elias; Voorneveld Mark

    2010-01-01

    The present paper extends the standard model of pairwise communication among Bayesianagents to cases where the structure of the communication protocol is not commonly known.We show that, even under strict conditions on the structure of the protocols and the nature of the transmitted signals, a consensus may never be reached if very little asymmetric information about the protocol is introduced.

  3. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  4. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  5. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  6. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  7. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  8. 'BREAKS' Protocol for Breaking Bad News.

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-05-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  9. [Protocols for the health surveillance of fisherman].

    Science.gov (United States)

    Soleo, Leonardo; Cannizzaro, Emanuele; Lovreglio, Piero; Basso, Antonella; D'Errico, Maria Nicolà; Pira, Enrico

    2013-01-01

    To define protocols for health surveillance of workers in the marine fishing sector for specific occupational risk factors, considering the latest and most advanced scientific knowledge. The specific literature was analyzed to identify the occupational risk factors to which fishermen are exposed. Then, for each risk factor a protocol for the relative health checkups and their time schedule was defined. The risk factors to which fishermen are exposed are essentially noise, vibrations, solar and ultraviolet radiation, climatic agents (heat, cold, wind, rain, damp), chemical agents, shifts, work rate, night work, physical strain, stress, manual handling of loads, upper limb repetitive tasks, incongruous postures. The health protocols stipulate the health screening investigations to be carried out in all workers of a homogeneous group, and in-depth diagnostic investigations to be carried out in symptomatic workers. Complementary health investigations must be focused on a functional exploration of the organs specifically exposed to the risk factor. For hearing impairments due to noise exposure, the medico-legal measures with which the occupational health physician must comply, in cases of occupational disease, are indicated.

  10. Biologic comparison of partial breast irradiation protocols

    International Nuclear Information System (INIS)

    Rosenstein, Barry S.; Lymberis, Stella C.; Formenti, Silvia C.

    2004-01-01

    Purpose: To analyze the dose/fractionation schedules currently used in ongoing clinical trials of partial breast irradiation (PBI) by comparing their biologically effective dose (BED) values to those of three standard whole breast protocols commonly used after segmental mastectomy in the treatment of breast cancer. Methods and materials: The BED equation derived from the linear-quadratic model for radiation-induced cell killing was used to calculate the BEDs for three commonly used whole breast radiotherapy regimens, in addition to a variety of external beam radiotherapy, as well as high-dose-rate and low-dose-rate brachytherapy, PBI protocols. Results: The BED values of most PBI protocols resulted in tumor control BEDs roughly equivalent to a 50-Gy standard treatment, but consistently lower than the BEDs for regimens in which the tumor bed receives a total dose of either 60 Gy or 66 Gy. The BED values calculated for the acute radiation responses of erythema and desquamation were nearly all lower for the PBI schedules, and the late-response BEDs for most PBI regimens were in a similar range to the BEDs for the standard treatments. Conclusion: Biologically effective dose modeling raises the concern that inadequate doses might be delivered by PBI to ensure optimal in-field tumor control

  11. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  12. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  13. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  14. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  15. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  16. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  17. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  18. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  19. Observing documentary reading by verbal protocol

    Directory of Open Access Journals (Sweden)

    Fujita Mariangela Spotti Lopes

    2003-01-01

    Full Text Available Verifies the applicability to research on indexers' reading strategies of the process observing technique known as Verbal Protocol or Thinking Aloud. This interpretative-qualitative data collecting technique allows the observation of different kinds of process during the progress of different kinds of tasks. Presents a theoretical investigation into "reading" and into formal methodological procedures to observe reading processes. Describes details of the methodological procedures adopted in five case studies with analysis of samples of data. The project adopted three kinds of parameters for data analysis: theoretical, normative, empirical (derived from observations made in the first case study. The results are compared, and important conclusions regarding documentary reading are drawn.

  20. Rosetta Ligand docking with flexible XML protocols.

    Science.gov (United States)

    Lemmon, Gordon; Meiler, Jens

    2012-01-01

    RosettaLigand is premiere software for predicting how a protein and a small molecule interact. Benchmark studies demonstrate that 70% of the top scoring RosettaLigand predicted interfaces are within 2Å RMSD from the crystal structure [1]. The latest release of Rosetta ligand software includes many new features, such as (1) docking of multiple ligands simultaneously, (2) representing ligands as fragments for greater flexibility, (3) redesign of the interface during docking, and (4) an XML script based interface that gives the user full control of the ligand docking protocol.

  1. Right to Food and the Nagoya Protocol

    Directory of Open Access Journals (Sweden)

    Romina Ysabel Bazán Barba

    2016-12-01

    Full Text Available In the perspective of Environmental Law, the juridical-sociological aspect addresses the problem for the Right to Food, which has been intensified by the lack of equity, social justice and mainly by environmental degradation. Based on theoretical research, the Constitution and international treaties on the subject, the problem of hunger is studied, with emphasis on the Nagoya Protocol – a new international instrument for access and distribution of genetic resources. It aims to analyze the geopolitics behind the hunger issue; the indiscriminate use of agrochemicals; the monopoly of seeds; and the lives wasted in the process of maintenance/circulation in the food market.

  2. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  3. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  4. Tools for Performance Assessment of OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Makoto Ikeda

    2009-01-01

    Full Text Available In this paper, we evaluate the performance of Optimized Link State Routing (OLSR protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.

  5. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  6. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht-Metzger, C. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  7. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Engebrecht, C. Metzger [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  8. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  9. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  10. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...... the statistical principles for trial protocols in terms of design, analysis, and reporting of findings....

  11. Perforated Sigmoid Diverticular Disease: a Management Protocol

    Science.gov (United States)

    Moin, Thajammul

    2008-01-01

    Background: To develop an evidence-based protocol for the management of perforated sigmoid diverticular disease. Methods: A search of the literature was undertaken. All publications pertaining to perforated sigmoid diverticular disease were analyzed and then categorized according to their level of evidence. Recommendations were then made on the basis of this. Results: Multiple case reports suggest that primary closure of perforation of sigmoid diverticula is safe in the absence of peritoneal contamination. Conclusions: A 2-stage laparoscopic approach incorporating the principles of damage limitation surgery may be a safe strategy in the management of perforated diverticular disease. PMID:18435896

  12. Analysis of protection spanning-tree protocol

    Directory of Open Access Journals (Sweden)

    Б.Я. Корнієнко

    2007-01-01

    Full Text Available  Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

  13. Proposed protocols for peripheral and renal Doppler

    International Nuclear Information System (INIS)

    Fonseca Portuguez, Adriana

    2009-01-01

    A literature review was performed in order to prepare a summary of the important concepts of Doppler and applications in peripheral vascular evaluation and renal. The normal characteristics are summarized and explained in each vascular system and diagnostic criteria of the disorders frequently encountered in practice. Requested more studies have been identified and proposed protocols and report sheets have been developed to standardize the methodology of realization of several Doppler studies. The variability between operators has been treated to reduce as much as possible and follow-up studies have provided in patients who need. (author) [es

  14. Hospital Casemix Protocol - Medibank Private Perspective.

    Science.gov (United States)

    Szakiel, John

    2010-06-01

    Hospital Casemix Protocol data provide a brief summary outlining morbidity data and costs associated with an episode of care. Federal government legislation requires that hospitals report this information to private health insurers who, in turn, merge these data with benefit outlays and report their findings to the Department of Health and Ageing (DoHA). This article gives a brief outline of the collection, cleansing and processing of these data and subsequent reporting to DoHA by Medibank Private, which accounts for approximately 30% of collected data.

  15. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  16. A 2004 view of the Kyoto Protocol

    International Nuclear Information System (INIS)

    Singer, F.

    2004-01-01

    It may not be a household word, but by now the Kyoto Protocol has become a well-known political slogan. It is either ''fundamentally flawed'' (George W. Bush) or it is essential for saving the climate and humanity (Al Gore). There seems to be no in between. The Kyoto Protocol is a treaty to limit (i.e., ration) the use of energy to satisfy the concerns of environmental groups and other believers in global warming catastrophes. This group includes not only certified kooks but also such notables as former Treasury Secretary Paul O'Neill and Sir David King, chief scientific adviser to Her Majesty's government who equates the threat of warming with that of international terrorism. But Kyoto is quite ineffective, that is, it cannot really affect climate or even change the composition of the atmosphere. It is costly. And it is probably also defunct. Where did this treaty come from? Why is it being adopted by some countries but not by others? And what is its likely future?

  17. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  18. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  19. ISS protocol for EPR tooth dosimetry

    International Nuclear Information System (INIS)

    Onori, S.; Aragno, D.; Fattibene, P.; Petetti, E.; Pressello, M.C.

    2000-01-01

    The accuracy in Electron Paramagnetic Resonance (EPR) dose reconstruction with tooth enamel is affected by sample preparation, dosimetric signal amplitude evaluation and unknown dose estimate. Worldwide efforts in the field of EPR dose reconstruction with tooth enamel are focused on the optimization of the three mentioned steps in dose assessment. In the present work, the protocol implemented at ISS in the framework of the European Community Nuclear Fission Safety project 'Dose Reconstruction' is presented. A combined mechanical-chemical procedure for ground enamel sample preparation is used. The signal intensity evaluation is carried out with powder spectra simulation program. Finally, the unknown dose is evaluated individually for each sample with the additive dose method. The unknown dose is obtained by subtracting a mean native dose from the back-extrapolated dose. As an example of the capability of the ISS protocol in unknown dose evaluation, the results obtained in the framework of the 2nd International Intercomparison on EPR tooth enamel dosimetry are reported

  20. Croatia energy planning and Kyoto Protocol

    International Nuclear Information System (INIS)

    Duic, Neven; Juretic, Franjo; Zeljko, Mladen; Bogdan, Z.

    2005-01-01

    Croatia as an Annex I country of the UN Framework Convention on Climate Change and a country that has pledged in the Annex B of the Kyoto Protocol to reduce its GHG emissions by 5% will have to envisage a new energy strategy. Compared to the energy consumption collapse in some transitional countries, Croatia has passed through a relatively short-term reduction of GHG emissions since 1990 because of higher energy efficiency of its pretransition economy. It is expected that in case of baseline scenario, it will breach the Kyoto target in 2003. Several scenarios of power generation are compared from the point of view of GHG emissions. The cost-effective scenario expects a mixture of coal and gas fired power plants to be built to satisfy the new demand and to replace the old power plants that are being decommissioned. More Kyoto friendly scenario envisages forcing the compliance with the Protocol with measures only in power generation sector by the construction of mainly zero emission generating capacity in the future, while decommissioning the old plants as planned, and is compared to the others from the GHG emissions point of view. The conclusion is that by measures tackling only power generation, it will not be possible to keep GHG emission under the Kyoto target level. The case of including the emissions from Croatian owned power plants in former Yugoslavia is also discussed

  1. The Montreal Protocol for Identification of Amusia.

    Science.gov (United States)

    Vuvan, D T; Paquette, S; Mignault Goulet, G; Royal, I; Felezeu, M; Peretz, I

    2018-04-01

    The Montreal Battery for the Evaluation of Amusia (MBEA; Peretz, Champod, & Hyde Annals of the New York Academy of Sciences, 999, 58-75, 2003) is an empirically grounded quantitative tool that is widely used to identify individuals with congenital amusia. The use of such a standardized measure ensures that the individuals tested will conform to a specific neuropsychological profile, allowing for comparisons across studies and research groups. Recently, a number of researchers have published credible critiques of the usefulness of the MBEA as a diagnostic tool for amusia. Here we argue that the MBEA and its online counterpart, the AMUSIA tests (Peretz et al. Music Perception, 25, 331-343, 2008), should be considered steps in a screening process for amusia, rather than standalone diagnostic tools. The goal of this article is to present, in detailed and easily replicable format, the full protocol through which congenital amusics should be identified. In providing information that has often gone unreported in published articles, we aim to clarify the strengths and limitations of the MBEA and to make recommendations for its continued use by the research community as part of the Montreal Protocol for Identification of Amusia.

  2. Hardening Stratum, the Bitcoin Pool Mining Protocol

    Directory of Open Access Journals (Sweden)

    Recabarren Ruben

    2017-07-01

    Full Text Available Stratum, the de-facto mining communication protocol used by blockchain based cryptocurrency systems, enables miners to reliably and efficiently fetch jobs from mining pool servers. In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners. We introduce StraTap and ISP Log attacks, that infer miner earnings if given access to miner communications, or even their logs. We develop BiteCoin, an active attack that hijacks shares submitted by miners, and their associated payouts. We build BiteCoin on WireGhost, a tool we developed to hijack and surreptitiously maintain Stratum connections. Our attacks reveal that securing Stratum through pervasive encryption is not only undesirable (due to large overheads, but also ineffective: an adversary can predict miner earnings even when given access to only packet timestamps. Instead, we devise Bedrock, a minimalistic Stratum extension that protects the privacy and security of mining participants. We introduce and leverage the mining cookie concept, a secret that each miner shares with the pool and includes in its puzzle computations, and that prevents attackers from reconstructing or hijacking the puzzles.

  3. Separable states improve protocols with finite randomness

    International Nuclear Information System (INIS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-01-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord. (paper)

  4. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    Science.gov (United States)

    1988-08-01

    services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design

  5. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  6. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  7. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  8. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  9. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  10. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  11. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  12. Improving the capacity of the ping-pong protocol

    OpenAIRE

    Cai, Qing-yu; Li, Bai-wen

    2003-01-01

    We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message aut...

  13. Protocol - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...e version) File URL: ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_protocol_jp.zip File size: 535 KB Fil...e name: rpd_protocol_en.zip (English version) File URL: ftp://ftp.biosciencedbc.jp/archiv...tabase Database Description Download License Update History of This Database Site Policy | Contact Us Protocol - RPD | LSDB Archive ...

  14. Blockchain Consensus Protocols in the Wild (Keynote Talk)

    OpenAIRE

    Cachin, Christian; Vukolic, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  15. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  16. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  17. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  18. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  19. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  20. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  1. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  2. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  3. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  4. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  5. Genomics protocols [Methods in molecular biology, v. 175

    National Research Council Canada - National Science Library

    Starkey, Michael P; Elaswarapu, Ramnath

    2001-01-01

    .... Drawing on emerging technologies in the fields of bioinformatics and proteomics, these protocols cover not only those traditionally recognized as genomics, but also early therapeutich approaches...

  6. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  7. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  8. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  9. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  10. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  11. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weijia Wang

    2014-06-01

    Full Text Available Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable effciency features of PairHand, but enjoys the provable security in the random oracle model.

  12. Variability in donation after cardiac death protocols: a national survey.

    Science.gov (United States)

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  13. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  14. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  15. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...... on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes...... in an actively secure flavour and in a covertly secure one, both of which compare favourably to previous work in terms of efficiency and provable security. Moreover, the covertly secure solution includes a key generation protocol that allows players to obtain a public key and shares of a corresponding secret key...

  16. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... groups. In all cases, security follows from a well de ned complexity assumption (the strong root assumption), without relying on random oracles. A smooth natural number has no big prime factors. The probability, that a random natural number not greater than x has all prime factors smaller than x1/u...

  17. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  18. The Kyoto Protocol Is Cost-effective

    Directory of Open Access Journals (Sweden)

    Marino Gatto

    2002-06-01

    Full Text Available Despite recent advances, there is a high degree of uncertainty concerning the climate change that would result from increasing atmospheric greenhouse gas concentrations. Also, opponents of the Kyoto Protocol raised the key objection that reducing emissions would impose an unacceptable economic burden on businesses and consumers. Based on an analysis of alternative scenarios for electricity generation in Italy, we show that if the costs in terms of damage to human health, material goods, agriculture, and the environment caused by greenhouse gas emissions are included in the balance, the economic argument against Kyoto is untenable. Most importantly, the argument holds true even if we exclude global external costs (those due to global warming, and account for local external costs only (such as those due to acidic precipitation and lung diseases resulting from air pollution.

  19. Data-sharing protocol: A prototype implementation

    International Nuclear Information System (INIS)

    Gibney, T.; Greenwood, D.

    1992-12-01

    This paper describes a client/server communication protocol which will allow physicists to access data from cooperating remote experiments. Special low-level ''client'' software within the user's ''home'' data-access library formulates a request for data from the remote experiment. This request is sent over a network to a server at the remote site. The server has specific knowledge about the location and format of the requested data. The server gets the data and sends it over the network to the requesting client, which reformats the data according to the local library's conventions. Our prototype is being developed to suppose remote access to data from ATF, PBX, and micro Vax data from Tore-Supra. We have attempted to create a flexible design which should accommodate data from other experiments as well

  20. Neonatal euthanasia: lessons from the Groningen Protocol.

    Science.gov (United States)

    Eduard Verhagen, A A

    2014-10-01

    Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  2. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.

  3. Automata Techniques for Epistemic Protocol Synthesis

    Directory of Open Access Journals (Sweden)

    Guillaume Aucher

    2014-04-01

    Full Text Available In this work we aim at applying automata techniques to problems studied in Dynamic Epistemic Logic, such as epistemic planning. To do so, we first remark that repeatedly executing ad infinitum a propositional event model from an initial epistemic model yields a relational structure that can be finitely represented with automata. This correspondence, together with recent results on uniform strategies, allows us to give an alternative decidability proof of the epistemic planning problem for propositional events, with as by-products accurate upper-bounds on its time complexity, and the possibility to synthesize a finite word automaton that describes the set of all solution plans. In fact, using automata techniques enables us to solve a much more general problem, that we introduce and call epistemic protocol synthesis.

  4. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  5. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-09-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  6. Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose.

    Science.gov (United States)

    Valle, Xavier; L Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume

    2015-12-01

    Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP.

  7. The development of optimization protocol in SRS

    International Nuclear Information System (INIS)

    Oh, S. J.; Suh, T. S.; Lee, H. K.; Choe, B. Y.

    2002-01-01

    In an operation of stereotactic radiosurgery(SRS), a high dose must be delivered to a target region while a normal tissue region must be spared. Using dose distribution which fits in a target region satisfies this purpose. This is solved by using data bases through the simple patient model simulating the brain model and the tumor region. The objective of this research is to develop brain model with tumor based on pseudo coordinate and systematic optimization protocol and to construct data base(DB) about beam parameters such as position and number of isocenter and collimator size. The normal tissue region of patient can be spared by DB in a operation of SRS

  8. The development of optimization protocol in SRS

    Energy Technology Data Exchange (ETDEWEB)

    Oh, S. J.; Suh, T. S.; Lee, H. K.; Choe, B. Y. [The Catholic Univ., of Korea, Seoul (Korea, Republic of)

    2002-07-01

    In an operation of stereotactic radiosurgery(SRS), a high dose must be delivered to a target region while a normal tissue region must be spared. Using dose distribution which fits in a target region satisfies this purpose. This is solved by using data bases through the simple patient model simulating the brain model and the tumor region. The objective of this research is to develop brain model with tumor based on pseudo coordinate and systematic optimization protocol and to construct data base(DB) about beam parameters such as position and number of isocenter and collimator size. The normal tissue region of patient can be spared by DB in a operation of SRS.

  9. Field protocols for the genomic era

    Directory of Open Access Journals (Sweden)

    N Bulatova

    2009-08-01

    Full Text Available For many decades karyotype was the only source of overall genomic information obtained from species of mammal. However, approaches have been developed in recent years to obtain molecular and ultimately genomic information directly from the extracted DNA of an organism. Molecular data have accumulated hugely for mammalian taxa. The growing volume of studies should motivate field researchers to collect suitable samples for molecular analysis from various species across all their ranges. This is the reason why we here include a molecular sampling procedure within a field work protocol, which also includes more traditional (including cytogenetic techniques. In this way we hope to foster the development of molecular and genomic studies in non-standard wild mammals.

  10. Multi-protocol header generation system

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, David A.; Ignatowski, Michael; Jayasena, Nuwan; Loh, Gabriel

    2017-09-05

    A communication device includes a data source that generates data for transmission over a bus, and a data encoder that receives and encodes outgoing data. An encoder system receives outgoing data from a data source and stores the outgoing data in a first queue. An encoder encodes outgoing data with a header type that is based upon a header type indication from a controller and stores the encoded data that may be a packet or a data word with at least one layered header in a second queue for transmission. The device is configured to receive at a payload extractor, a packet protocol change command from the controller and to remove the encoded data and to re-encode the data to create a re-encoded data packet and placing the re-encoded data packet in the second queue for transmission.

  11. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  12. A simulation of the FASTBUS protocols

    International Nuclear Information System (INIS)

    Booth, A.W.

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. It's applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator. (orig.)

  13. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...... the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... years the secure multiparty computation problem has been the subject of a large body of research, both research into the models of multiparty computation and research aimed at realizing general secure multiparty computation. The main approach to realizing secure multiparty computation has been based...

  14. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  15. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  16. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  17. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  18. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  19. Information required from States, including 'small quantities protocol' status, under the Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    Tuley, N.

    1999-01-01

    The Model, or Additional, Protocol to the Model Safeguards Agreement, INFCIRC/153, contains, inter alia, provisions for expanded declarations from Member States to the IAEA. These provisions include earlier design information declarations and information on fuel cycles activities, such a mining and milling, that were not previously part of safeguards. The session discusses the extent of the expanded declarations and provides examples of the forms that will be used to provide the information to the Agency. (author)

  20. Using critiquing for improving medical protocols : Harder than it seems

    NARCIS (Netherlands)

    Marcos, Mar; Berger, Geert; van Harmelen, Frank; ten Teije, Annette; Roomans, Hugo; Miksch, Silvia

    2001-01-01

    Medical protocols are widely recognised to provide clinicians with high-quality and up-to-date recommendations. A critical condition for this is of course that the protocols themselves are of high quality. In this paper we investigate the use of critiquing for improving the quality of medical

  1. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  2. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  3. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  4. Samples and Sampling Protocols for Scientific Investigations | Joel ...

    African Journals Online (AJOL)

    ... from sampling, through sample preparation, calibration to final measurement and reporting. This paper, therefore offers useful information on practical guidance on sampling protocols in line with best practice and international standards. Keywords: Sampling, sampling protocols, chain of custody, analysis, documentation ...

  5. Energy-efficient TDMA medium access control protocol scheduling

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerard J.M.

    2000-01-01

    In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling mechanisms. Most MAC protocols are based on phase grouping that basically has three phases in a frame: uplink, downlink and reservation. We propose a new mechanism in which we have multiple uplink and

  6. Dynamic-Threshold-Limited Timed-Token (DTLTT) Protocol | Kalu ...

    African Journals Online (AJOL)

    An improved version of the Static-Threshold-Limited On-Demand Guaranteed Service Timed-Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous trac in Multiservice Local Area Network (MLANs) was developed and analyzed. TLODGSTT protocol uses static value of ...

  7. Constant round group key agreement protocols: A comparative study

    NARCIS (Netherlands)

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  8. A Dialogue Game Protocol for Agent Purchase Negotiations

    NARCIS (Netherlands)

    McBurney, P.; Eijk, R.M. van; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines

  9. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  10. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  11. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  12. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  13. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  14. Developing a yeast-based assay protocol to monitor total ...

    African Journals Online (AJOL)

    A yeast-based assay protocol developed for detecting oestrogenic activity in activated sludge (AS) supernatant is described. The protocol used Saccharomyces cerevisiae construct RMY/ER-ERE with human oestrogen receptor (ERα) and lacZ reporter genes, and was developed by modifying existing assays for use with AS ...

  15. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  16. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C5...

  17. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    It may be noted that these protocols are not the only approaches of gener- ating maximally entangled states. There are several other protocols such as entanglement purification [8–12], quantum entanglement distillation [13,14], etc., to this effect. The history of ECP starts in the work of Bennett et al [8] in 1996 in which he ...

  18. On the Security of the Ping-Pong Protocol

    OpenAIRE

    Bostroem, Kim; Felbinger, Timo

    2007-01-01

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  19. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  20. On the security of the ping-pong protocol

    International Nuclear Information System (INIS)

    Bostroem, Kim; Felbinger, Timo

    2008-01-01

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous